Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Subsidiarity & Vulnerability Theory: A Case Study For Deepening The Relationship Between Catholic Social Teaching And The Responsive State, Nathaniel Romano Dec 2022

Subsidiarity & Vulnerability Theory: A Case Study For Deepening The Relationship Between Catholic Social Teaching And The Responsive State, Nathaniel Romano

Catholic University Law Review

Religion and religious voices have long had a role to play in shaping community norms and values and public policy; this role continues in contemporary America. Yet, legitimate questions arise about the extent of this role and its place in a pluralist and democratic state. These questions are particularly pronounced when religion is perceived as partisan, a situation that seems apparent in contemporary America. Hoping to combat this perception, this paper explores the relationship between Catholic Social Teaching and Vulnerability Theory, aiming to show how religious values can inform legal theory across the political spectrum. This paper surveys both Catholic …


State Spoliation Claims In Federal District Courts, Jeffrey A. Parness Mar 2022

State Spoliation Claims In Federal District Courts, Jeffrey A. Parness

Catholic University Law Review

The increasing amounts of electronically stored information (ESI) relevant to civil litigation, and the ease of their loss, caused federal lawmakers explicitly to address the possible consequences of certain pre-suit or post-suit ESI losses. These lawmakers acted in both 2006 and 2015 through Federal Civil Procedure (FRCP) 37(e). But they acted only on certain ESI. Their actions have prompted increasing attention to the significant risks of pre-suit and post-suit losses of all ESI, and of non-ESI, otherwise discoverable in civil actions. In addition, their actions have spurred increasing attention to the availability of substantive law claims involving spoliation of information …