Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Commercial Law

BLR

Internet Law

Publication Year

Articles 1 - 8 of 8

Full-Text Articles in Law

A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Cash, Credit Or Cell Phone? How To Influence Public Preferences About Payment Systems, Sarah E. Waldeck, Erik Lillquist Sep 2006

Cash, Credit Or Cell Phone? How To Influence Public Preferences About Payment Systems, Sarah E. Waldeck, Erik Lillquist

ExpressO

The paper examines how the government can influence the public’s choice of a particular payment system: not only existing systems like credit and debit cards, but innovative products such as stored value cards, electronic checks and electronic money. The success or failure of a new payment system can have a large economic impact, with shifts toward electronic payment options in particular having the potential to save up to one percent of a nation’s gross domestic product. For the United States, that translates to approximately one hundred billion dollars worth of savings.

Whether a new payment system succeeds or fails depends …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi Apr 2006

Identity Theft And Consumer Protection: Finding Sensible Approaches To Safeguard Personal Data In The United States And Canada, Kamaal Zaidi

ExpressO

This paper examines identity theft in both the United States and Canada. Various examples of commercial fraud and scams are discussed in the context of a growing trend of identity thieves assuming identities of innocent consumers. As such, various pieces of legislation and consumer initiatives (involving online consumer complaint mechanisms)in U.S. and Canadian jurisdictions are highlighted to demonstrate the pursuit towards broader consumer protection of personal data used in daily commercial transactions. The author argues that these modern efforts to safeguard consumers from identity theft is a progressive measure that will continue to afford increasing protections for consumer personal data, …


Global Pharmaceutical Patent Law In Developing Countries- Amending Trips To Promote Access For All, Angela J. Anderson Mar 2006

Global Pharmaceutical Patent Law In Developing Countries- Amending Trips To Promote Access For All, Angela J. Anderson

ExpressO

This comment will analyze the need to amend and revise the current global pharmaceutical patent system under TRIPS to take into account the needs of developing countries and overall public health. This comment will emphasize that the current international trade rules, which although administered by the WTO, are dictated by developed country governments and powerful pharmaceutical companies, and therefore, without reform will further diminish the access of poor people in developing countries to vital medicines. Part II of this comment will provide a general overview of the international trade law governing patents on pharmaceuticals focusing specifically on the development of …


Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding Feb 2006

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding

ExpressO

Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


What Makes Asset Securitization "Inefficient"?, Kenji Yamazaki May 2005

What Makes Asset Securitization "Inefficient"?, Kenji Yamazaki

ExpressO

Despite the damage caused by the recent Enron scandal , the asset securitization market has been vibrant and has become a popular financing alternative . A number of academics emphasize its merits and suggest that it is a more favorable way of financing, and Congress’s proposal to make sales of asset in securitization immune from characterization as secured transactions under the Bankruptcy Reform Act of 2001 (the “Reform Act”) almost materialized when the Enron scandal hit the scene. Conversely, there have been accusations that securitization is not a legitimate way of financing because, for example, it fosters fraudulent transactions.

Why …