Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed Aug 2015

The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed

Ahad Syed

This Article examines the purpose and interpretation by courts of Freedom of Information Act’s 7(C) Exemption. Specifically, the Article sets out to unravel the current federal circuit court split over Exemption 7(C) by examining its application to the digital privacy dilemma as applied to arrestee photographs, commonly known as “mug shots.” Automated data-scraping programs continuously scour the internet, reaping, replicating, and reposting photographs of arrestees who may or may not have had charges dismissed in order to shame them into paying website owners for removal. While other commentators have argued for state law penalizing pay-to-remove mug shot websites only, this …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden Jul 2015

Déjà Vu All Over Again: Questions And A Few Suggestions On How The Fcc Can Lawfully Regulate Internet Access, Rob Frieden

Rob Frieden

This paper will examine the FCC’s March, 2015 Open Internet Order with an eye to assessing whether and how the Commission can successfully defend its decision in an appellate court. On two prior occasions, the FCC failed to convince a reviewing court that proposed regulatory safeguards do not unlawfully impose common carrier duties on private carriers. The Commission now has opted to reclassify broadband Internet access as common carriage, a decision sure to trigger a third court appeal. The FCC Open Internet Order offers several, possibly contradictory, justifications for its decision to apply Title II of the Communications Act, subject …


The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh Jan 2015

The New Wild West: Preventing Money Laundering In The Bitcoin Network, Kavid Singh

Kavid Singh

Bitcoin is the most popular online decentralized currency in the world. Created by an enigmatic figure, Satoshi Nakamoto, in 2009, its propagation and use has caused heated controversy. On the legal side of its use, businesses both large and small have started to accept bitcoins as a form of payment. On the illegal side of its use, large quantities of bitcoins worth hundreds of millions of dollars have been stolen from businesses and large Bitcoin currency exchanges. The aim of this article is to introduce workable federal regulation that will help deter money laundering, a pervasive problem in the world …


Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague Dec 2014

Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Law Abiding Drones