Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Michigan Journal of International Law

This Article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States-two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes-and accepts-the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts-flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …


Harnessing And Sharing The Benefits Of State-Sponsored Research: Intellectual Property Rights And Data Sharing In California's Stem Cell Initiative, Rebecca S. Eisenberg, Arti K. Rai Jan 2006

Harnessing And Sharing The Benefits Of State-Sponsored Research: Intellectual Property Rights And Data Sharing In California's Stem Cell Initiative, Rebecca S. Eisenberg, Arti K. Rai

Articles

This Article discusses data sharing in California's stem cell initiative against the background of other data sharing efforts and in light of the competing interests that CIRM is directed to balance. We begin by considering how IP law affects data sharing. We then assess the strategic considerations that guide the IP and data policies and strategies of federal, state, and private research sponsors. With this background, we discuss four specific sets of issues that public sponsors of data-rich research, including CIRM, are likely to confront: (1) how to motivate researchers to contribute data; (2) who should have access to the …