Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2014

Law and Technology

Articles 61 - 77 of 77

Full-Text Articles in Law

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles Maclean Jan 2014

Riley V. California: Privacy Still Matters, But How Much And In What Contexts?, Adam Lamparello, Charles Maclean

Adam Lamparello

Private information is no longer stored only in homes or other areas traditionally protected from warrantless intrusion. The private lives of many citizens are contained in a digital device no larger than the palm of their hand—and carried in public places. But that does not make the data within a cell phone any less private, just as the dialing of a phone number does not voluntarily waive an individual’s right to keep their call log or location private. Remember that we are not talking about individuals suspected of committing violent crimes. The Government is recording the calls and locations of …


An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock Jan 2014

An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock

Ferris K Nesheiwat

This article seeks to provide a socio-legal framework for the examination of the attitude of a section of the Jordanian public towards intellectual property rights (IPRs), using copyright protected software as an example; it provides an overview of perceptions of IPRs within an Arabic and predominantly Muslim society, and examines how such perceptions impact attitudes towards abiding with, and enforcement of, IPRs. Through its analytical value and empirical research, this paper fills a void in the availability of reliable empirical data in Jordan as part of the analysis to gauge the impact of intellectual property (IP) laws. A review of …


Innovation & Intellectual Property: Collaborative Dynamics In Africa Jan 2014

Innovation & Intellectual Property: Collaborative Dynamics In Africa

Chidi Oguamanam

No abstract provided.


When The Mountain Goes To Mohammed: The Internet And Judicial Decision-Making, Layne S. Keele Jan 2014

When The Mountain Goes To Mohammed: The Internet And Judicial Decision-Making, Layne S. Keele

Layne S. Keele

Judges increasingly are scouring the Internet in search of case-related facts, often without the parties’ knowledge. This article grapples with the question of what limits, if any, should circumscribe judicial Internet use. Drawing a distinction between online searches for adjudicative facts and online research into legislative facts, I argue that the former are always improper, while the propriety of the latter depends largely on one’s view of the role of the judiciary. In both cases, Internet research creates unique risks not found with other kinds of research, and this article offers some suggestions for alleviating those risks. This article also …


Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr. Jan 2014

Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

The public’s interest in medicine and good health is substantial. However, this interest is harmed when important medical devices or pharmaceuticals, although infringing on valid patents, are suddenly taken off the market after a court grants a permanent injunction. While permanent injunctions were automatically granted by the Federal Circuit before the Supreme Court’s holding in eBay v. MercExchange, courts now have more discretion to deny injunctive relief. Now that courts have this newfound discretion after eBay, the public should no longer expect to be harmed by the sudden removal of medical supplies. Unfortunately, this has not been the course that …


New Models And Conflicts In The Interconnection And Delivery, Rob Frieden Jan 2014

New Models And Conflicts In The Interconnection And Delivery, Rob Frieden

Rob Frieden

As the Internet has evolved and diversified, interconnection terms and conditions have changed between Internet Service Providers (“ISPs”). These carriers experiment with alternatives to conventional models that classify interconnection as either peering or transiting. The former typically involves interconnection between high capacity carriers whose transoceanic traffic volumes generally match thereby eliminating the need for a transfer of funds. Historically smaller carriers have paid transit fees to larger Tier-1 ISPs for the opportunity to secure upstream links throughout the Internet cloud. With the growing availability of bandwidth intensive, video content carried via the Internet, traffic volume disparities have increased between ISPs. …


Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden Jan 2014

Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …


Will More, Better, Cheaper, And Faster Monitoring Improve Environmental Management?, Ryan P. Kelly Jan 2014

Will More, Better, Cheaper, And Faster Monitoring Improve Environmental Management?, Ryan P. Kelly

Ryan P Kelly

Two critical problems in environmental management are a lack of primary data and the difficulty of assessing the environmental impacts of human activities. Producing the information necessary to address these twin challenges is often difficult and expensive, which impedes decisionmaking in environmental management. I focus here on the possibility of making data collection more powerful and more cost-effective with a suite of analyses made tractable by emerging technology for genetic analysis. More, better, cheaper, and faster information about the planet’s living resources promises to influence a wide range of legal and policy processes—from Clean Water Act compliance and related public …


Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald Dec 2013

Nothing To Fear Or Nowhere To Hide: Competing Visions Of The Nsa's 215 Program, Susan Freiwald

Susan Freiwald

Despite Intelligence Community leaders’ assurances, the detailed knowledge of the NSA metadata program (the 215 program) that flowed from the Snowden revelations did not assuage concerns about the program. Three groups, the American Civil Liberties Union, the Electronic Frontier Foundation, and the Electronic Privacy Information Center, brought immediate legal challenges with mixed results in the lower courts. The conflict, in the courts, Congress, and the press, has revealed that the proponents and opponents of Section 215 view the program in diametrically opposed ways. Program proponents see a vital intelligence program operating within legal limits, which has suffered a few compliance …


California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson Dec 2013

California Egg Toss - The High Costs Of Avoiding Unenforceable Surrogacy Contracts, Jennifer Jackson

Jennifer Jackson

In an emotionally charged decision regarding surrogacy contracts, it is important to recognize the ramifications, costs, and policy. There are advantages to both “gestational carrier surrogacy” contracts and “traditional surrogacy” contracts. However, this paper focuses on the differences between these contracts using case law. Specifically, this paper will focus on the implications of California case law regarding surrogacy contracts. Cases such as Johnson v. Calvert and In Re Marriage of Moschetta provide a clear distinction between these contracts. This distinction will show that while gestational carrier surrogacy contracts are more expensive, public policy and court opinions will provide certainty and …


Anticipating The Storm: Predicting And Preventing Global Technology Conflicts, Sabrina Safrin Dec 2013

Anticipating The Storm: Predicting And Preventing Global Technology Conflicts, Sabrina Safrin

Sabrina Safrin

This article helps lay the foundation for a new field of international law — International Law and Technology — and opens novel avenues of inquiry in law and technology and intellectual property more broadly. It analyzes as a starting point why some technologies generate global conflicts while others do not. Technologies that face international resistance can trigger a barrage of international legal responses, ranging from trade bans and WTO disputes to international regulatory regimes and barriers to patenting. Agricultural biotechnology triggered all of these legal flashpoints, while the cellphone, a technology that grew up alongside it, triggered none. Why?

Understanding …


Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid Dec 2013

Grounding Drones: Big Brother’S Tool Box Needs Regulation Not Elimination, Melanie M. Reid

Melanie M. Reid

One of the most significant contemporary issues in privacy law relates to law enforcement’s new domestic surveillance tool: unmanned aerial vehicles, also known as, drones. Law enforcement’s use of aerial surveillance as an investigatory tool is currently under attack. In the past, if law enforcement chose to follow a suspect throughout the day, either on the ground or in the air, they need not worry about seeking a warrant or determining whether probable cause or reasonable suspicion exists to justify their surveillance. Aerial surveillance of criminal suspects has been considered outside the protections of Fourth Amendment law. In the 1980’s, …


No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague Dec 2013

No Surfing Allowed: A Review And Analysis Of Legislation Prohibiting Employers From Demanding Access To Employees’ And Job Applicants’ Social Media Accounts, Robert Sprague

Robert Sprague

This article examines recent state legislation prohibiting employers from requesting username and password information from employees and job applicants in order to access restricted portions of those employees’ and job applicants’ personal social media accounts. This article raises the issue of whether this legislation is even needed, from both practical and legal perspectives, focusing on: (a) how prevalent the practice is of requesting employees’ and job applicants’ social media access information; (b) whether alternative laws already exist which prohibit employers from requesting employees’ and job applicants’ social media access information; and (c) whether any benefits can be derived from this …


Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner Dec 2013

Self, Privacy, And Power: Is It All Over? (With R. Sloan), Richard Warner

Richard Warner

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Dec 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

Richard Warner

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Discretionary Injunctive Relief For Patent Infringement: Partial Remuneration After Ebay And Its Implications For The Developing World, Richard Li-Dar Wang Dec 2013

Discretionary Injunctive Relief For Patent Infringement: Partial Remuneration After Ebay And Its Implications For The Developing World, Richard Li-Dar Wang

Richard Li-dar Wang

The eBay decision of the U.S. Supreme Court in 2006 opens the door for discretionary injunctive relief in patent infringement cases. This essay examines the development of case law and scholarly discussion in the post-eBay era. The author finds eBay illuminates that patents are not private rights that demand full remuneration when being infringed, but rather a tool of incentivizing sufficient innovations to the public. The remedies for patent infringement need not redress all the losses that the patentee suffers, but rather simply reimburse the R&D cost for the purpose of preventing over-incentivizing. Six indicators are put forth to assess …


Keeping Up With The Game: The Use Of The Nash Bargaining Solution In The Calculation Of Reasonable Royalty Damages In Patent Infringement Cases, Lance E. Wyatt Jr. Dec 2013

Keeping Up With The Game: The Use Of The Nash Bargaining Solution In The Calculation Of Reasonable Royalty Damages In Patent Infringement Cases, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

Determining damages are an integral stage in the patent litigation process. Since 1970, reasonable royalty damages have been calculated using the factors set forth in the seminal decision, Georgia-Pacific Corp. v. United States Plywood Corp. However, these factors are prone to manipulation and abuse by damages experts. Using a solution to a two-person bargaining situation developed by John Nash, Jr. in 1950, damages experts have utilized the Nash Bargaining Solution as a method to calculate reasonable royalty damages in patent infringement cases. Since its introduction in patent infringement cases, courts have been reluctant to admit the use of the NBS …