Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (16)
- Internet Law (7)
- Securities Law (7)
- Bankruptcy Law (5)
- Business Organizations Law (5)
-
- Courts (5)
- Health Law and Policy (5)
- International Law (5)
- Science and Technology Law (5)
- Communications Law (4)
- Comparative and Foreign Law (4)
- Legal History (4)
- Civil Rights and Discrimination (3)
- Computer Law (3)
- Criminal Law (3)
- Judges (3)
- Jurisprudence (3)
- Law and Politics (3)
- Legal Ethics and Professional Responsibility (3)
- Privacy Law (3)
- Administrative Law (2)
- Antitrust and Trade Regulation (2)
- Business (2)
- Civil Law (2)
- Constitutional Law (2)
- Consumer Protection Law (2)
- Contracts (2)
- Criminal Procedure (2)
- Entertainment, Arts, and Sports Law (2)
- Institution
-
- Selected Works (5)
- Northwestern Pritzker School of Law (4)
- Vanderbilt University Law School (4)
- Fordham Law School (3)
- SelectedWorks (3)
-
- St. John's University School of Law (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University of Georgia School of Law (3)
- American University Washington College of Law (2)
- Pepperdine University (2)
- St. Mary's University (2)
- The Catholic University of America, Columbus School of Law (2)
- The University of Akron (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- Boston University School of Law (1)
- Golden Gate University School of Law (1)
- Marquette University Law School (1)
- New York Law School (1)
- Notre Dame Law School (1)
- Singapore Management University (1)
- Texas A&M University School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Florida Levin College of Law (1)
- University of Maine School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- University of New Hampshire (1)
- University of Oklahoma College of Law (1)
- Publication Year
- Publication
-
- Bankruptcy Research Library (3)
- Fordham Law Review (3)
- Northwestern Journal of Technology and Intellectual Property (3)
- Scholarly Works (3)
- Touro Law Review (3)
-
- Vanderbilt Law Review (3)
- Catholic University Law Review (2)
- Faculty Scholarship (2)
- The Journal of Business, Entrepreneurship & the Law (2)
- Warren Bartholomew CHIK (2)
- Warren Bartholomew Chik (2)
- Akron Law Faculty Publications (1)
- Akron Law Review (1)
- All Faculty Scholarship (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Faculty Articles (1)
- Faculty Publications (1)
- Faculty Working Papers (1)
- Georgia Journal of International & Comparative Law (1)
- Hillary A Henderson (1)
- Journal of Health Care Law and Policy (1)
- Journal of Intellectual Property Law (1)
- Law Faculty Publications (1)
- Law Faculty Scholarship (1)
- Maine Law Review (1)
- Marquette Intellectual Property Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Notre Dame Journal on Emerging Technologies (1)
- Oklahoma Law Review (1)
- Publication Type
Articles 1 - 30 of 60
Full-Text Articles in Law
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
UF Law Faculty Publications
This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …
Spac Mergers, Ipos, And The Pslra's Safe Harbor: Unpacking Claims Of Regulatory Arbitrage, Amanda M. Rose
Spac Mergers, Ipos, And The Pslra's Safe Harbor: Unpacking Claims Of Regulatory Arbitrage, Amanda M. Rose
William & Mary Law Review
Communications in connection with an initial public offering (IPO) are excluded from the safe harbor for forward-looking statements contained in the Private Securities Litigation Reform Act of 1995 (PSLRA). Unsurprisingly, IPO issuers do not share projections publicly—the liability risk is too great. By contrast, communications in connection with a merger are not excluded from the safe harbor, and special purpose acquisition companies (SPACs) routinely share their merger targets’ projections publicly. Does the divergent application of the PSLRA’s safe harbor in traditional IPOs and SPAC mergers create an opportunity for “regulatory arbitrage” and, if so, what should be done about it? …
A Transfer Made In Connection With A Securities Contract May Not Be Avoided Under Section 546(E) Of The Bankruptcy Code, Dennis Mossberg
A Transfer Made In Connection With A Securities Contract May Not Be Avoided Under Section 546(E) Of The Bankruptcy Code, Dennis Mossberg
Bankruptcy Research Library
(Excerpt)
Under title 11 of the United States Code (the “Bankruptcy Code”), a bankruptcy trustee has the power to avoid, or claw back, certain transfers of property made before a bankruptcy filing. A trustee may avoid transfers such as those that are preferential under section 547 and fraudulent transfers under section 548. Section 546(e) of the Bankruptcy Code generally provides that a transfer made by, to, or for the benefit of a commodity broker, stockbroker, financial institution, or securities clearing agency in connection with a securities contract cannot be avoided. In 2018, the Supreme Court clarified the scope of the …
The Error Of The Paquete Habana: U.S. Naval Forces In The Safe Harbor Of Commander-In-Chief Discretion And The Law Of War, T. Nelson Collier
The Error Of The Paquete Habana: U.S. Naval Forces In The Safe Harbor Of Commander-In-Chief Discretion And The Law Of War, T. Nelson Collier
St. Mary's Law Journal
Abstract forthcoming.
Abolishing The Communications Decency Act Might Sanitize "Political Biased," "Digitally Polluted," And "Dangerously Toxic" Social Media? - Judicial And Statistical Guidance From Federal-Preemption, Safe-Harbor And Rights-Preservation Decisions, Willy E. Rice
Faculty Articles
Sitting and former U.S. Presidents, as well as members of the general public, financial, political and educational institutions, use social media. Yet, an overwhelming majority of users, content creators, parents, "conservatives," "progressives," Democrats, and Republicans distrust social media owners. Some critics allege that owners "digitally pollute" platforms by encouraging users to post "corrosive, dangerous, toxic, and illegal content." Other critics assert that service providers' purportedly objective content moderation algorithms are biased-discriminating irrationally on the basis of users' political association, ideology, socioeconomic status, gender, and ethnicity. Republicans and Democrats have crafted roughly twenty bills on this matter. In theory, the enacted …
Losing The Battle Against Individual Infringers, Copyright Holders Set Their Sights On Internet Service Providers Once Again, Michael E. Benson
Losing The Battle Against Individual Infringers, Copyright Holders Set Their Sights On Internet Service Providers Once Again, Michael E. Benson
Notre Dame Journal on Emerging Technologies
This paper argues that, as a result of the courts limiting copyright holders from pursuing alleged individual infringers, that rights holders will once again target intermediaries, specifically ISPs, under a theory of secondary liability. Further, this paper comments on the renewed possibility of copyright holders successfully holding ISPs liable for secondary infringement, as copyright holders have been unable to do in the past. Part I lays out the main issues that copyright holders face in pursuing alleged individual online infringers and in pursuing the intermediaries that facilitate the alleged online infringement. Part II discusses a series of cases that weakened …
The Auditor's Responsibilities For Fraud Detection And Disclosure: Do The Auditing Standards Provide A Safe Harbor?, James L. Costello
The Auditor's Responsibilities For Fraud Detection And Disclosure: Do The Auditing Standards Provide A Safe Harbor?, James L. Costello
Maine Law Review
Eighty-seven percent of managers recently surveyed were willing to commit financial statement fraud. More than half were willing to overstate assets, forty-eight percent were willing to understate loss reserves and thirty-eight percent would "pad" a government contract. These disturbing results are underscored by the financial miseries still brewing in the savings and loan industry, as well as by other corporate and banking financial debacles of the past decade, including Lincoln Savings & Loan, Wedtech, and the Delorean sports car venture scandal. Amidst these financial ruins we find the chronic element of management fraud. Unfortunately for investors and depositors a troublesome …
Indecency Regulation Of The Fcc And Censorship Law In Republic Korea: Comparison And Contrasts, Min-Soo "Minee" Roh
Indecency Regulation Of The Fcc And Censorship Law In Republic Korea: Comparison And Contrasts, Min-Soo "Minee" Roh
Upper Level Writing Requirement Research Papers
Regulating music on radio or television is not a straightforward process, as the music is comprised of lyrics of words. On top of the lyrics, any music performance has an additional layer of choreography and dress code. If any individual elements or combined elements is obscene or indecent, the government attempts to regulate broadcasting both music and performance. This leads to regulating general speech on communications and it requires this paper to look into regulation of broadcasting in general and specific examples of music broadcasting regulation on radio and television, particularly, in the United States (“States”) and in Republic of …
Titles Ii Or Iii: Where Will The Wisdom Of The Crowd Take Investors?, William P. Lane
Titles Ii Or Iii: Where Will The Wisdom Of The Crowd Take Investors?, William P. Lane
Catholic University Law Review
Many small to moderate-sized businesses simply cannot afford the costs of the specialized accountants, underwriters, and attorneys necessary to meet the obligations that come with being a public company. To minimize these burdens recently approved regulations permit securities-based crowdfunding by certain private companies without registering the offering with the Securities and Exchange Commission.
On April 5, 2012, Congress passed, and President Barack Obama signed, the Jumpstart Our Business Startups Act (JOBS Act) into law. The goal of the JOBS Act was to increase job creation and economic growth by improving access to the markets. Along with other provisions, the JOBS …
Another Nail In The Coffin Of The Small Investor: The Private Securities Litigation Reform Act Of 1995, James Cotton
Another Nail In The Coffin Of The Small Investor: The Private Securities Litigation Reform Act Of 1995, James Cotton
Touro Law Review
No abstract provided.
Commentary To The U.S. Copyright Office Regarding The Section 512 Study: Higher Education And The Dmca Safe Harbors, Christopher A. Cotropia, James Gibson
Commentary To The U.S. Copyright Office Regarding The Section 512 Study: Higher Education And The Dmca Safe Harbors, Christopher A. Cotropia, James Gibson
Law Faculty Publications
The nearly twenty-year history of the Digital Millennium Copyright Act’s safe harbor provisions has been marked by criticism from content owners, online service providers, and end users. Content owners complain about the cost of monitoring online content and sending take-down notices. Online service providers complain about the cost of receiving and processing the notices. And end users complain about their legitimate use of copyrighted works being subject to DMCA take-down. Colleges and universities have been at the forefront of this controversy; as providers of online services to their students, they have been a focus of both Congress and copyright owners. …
Trade Secret Rising: Protecting Equivalency Test Research And Development Investments After Momenta V. Amphastar, Hannah-Alise Rogers
Trade Secret Rising: Protecting Equivalency Test Research And Development Investments After Momenta V. Amphastar, Hannah-Alise Rogers
Journal of Intellectual Property Law
No abstract provided.
A Laboratory Of Regulation: The Untapped Potential Of The Hhs Advisory Opinion Power, Christopher J. Climo
A Laboratory Of Regulation: The Untapped Potential Of The Hhs Advisory Opinion Power, Christopher J. Climo
Vanderbilt Law Review
Of late, the federal government's approach to regulation of hospitals and other healthcare providers asks them to do more with less. Both the government and private insurers have increasingly assigned hospitals and other providers with financial responsibility for the quality of the care they provide to federal beneficiaries.' At the same time, experts predict that reimbursement rates by both the government and private insurers will fall as a result of the Affordable Care Act's recent efforts to increase access to healthcare. Facing a widening gap between expectations of quality and availability of financial resources, healthcare providers will need to pursue …
Sex Slavery In The Lone Star State: Does The Texas Human Trafficking Legislation Of 2011 Protect Minors?, Cheryl Nelson Butler
Sex Slavery In The Lone Star State: Does The Texas Human Trafficking Legislation Of 2011 Protect Minors?, Cheryl Nelson Butler
Akron Law Review
This Article argues that, while Texas has made great strides in its movement to combat child trafficking, there are three major areas in which further reform is needed. First, Texas should provide stronger protections for not only minors trafficked for sex, but also those trafficked for labor. Second, Texas law must shift its emphasis from prosecution of traffickers to a more balanced approach that also prioritizes the protection of minors and the prevention of future trafficking crimes against them. Third, Texas should adopt safe harbor provisions that reflect a child welfare response toward prostituted minors
Classifying Obesity As A Disability Under The Americans With Disabilities Act: How Seff V. Broward County Is Incongruent With Recent Ada Litigation, Maura Flaherty Mccoy
Classifying Obesity As A Disability Under The Americans With Disabilities Act: How Seff V. Broward County Is Incongruent With Recent Ada Litigation, Maura Flaherty Mccoy
Catholic University Law Review
This Note discusses how employer wellness programs are potential breeding grounds for Americans with Disabilities Act discrimination claims in light of recent ADA cases relating to obesity and how courts’ treatment of the safe harbor provision of the ADA is incongruent with the broadening of ADA claims. It looks at the provisions of the ADA and how courts have traditionally defined “disability” in obesity cases, describes the ADA safe harbor provision, and discusses the advent of corporate wellness programs. This Note then analyzes Seff v. Broward County, the most notable wellness program case to-date, and how the court’s decision …
International Implications Of The 1982 Merger Guidelines, Vincent Draa
International Implications Of The 1982 Merger Guidelines, Vincent Draa
Georgia Journal of International & Comparative Law
No abstract provided.
Ponzi Schemes In Bankruptcy, Honorable Dorothy T. Eisenberg, Nicholas W. Quesenberry
Ponzi Schemes In Bankruptcy, Honorable Dorothy T. Eisenberg, Nicholas W. Quesenberry
Touro Law Review
No abstract provided.
The Bankruptcy-Law Safe Harbor For Derivatives: A Path-Dependence Analysis, Steven L. Schwarcz, Ori Sharon
The Bankruptcy-Law Safe Harbor For Derivatives: A Path-Dependence Analysis, Steven L. Schwarcz, Ori Sharon
Washington and Lee Law Review
U.S. bankruptcy law grants special rights and immunities to creditors in derivatives transactions, including virtually unlimited enforcement rights. This Article argues that these rights and immunities result from a form of path dependence, a sequence of industry-lobbied legislative step s, each incremental and in turn serving as apparent justification for the next step, without a rigorous and systematic vetting of the consequences. Because the resulting “safe harbor” has not been fully vetted, its significance and utility should not be taken for granted; thus, regulators, legislators, and other policymakers—whether in the United States or abroad—should not automatically assume, based on its …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
The Snowden Revelations, The Transatlantic Trade And Investment Partnership And The Divide Between U.S.- Eu In Data Privacy Protection, Ioanna Tourkochoriti
The Snowden Revelations, The Transatlantic Trade And Investment Partnership And The Divide Between U.S.- Eu In Data Privacy Protection, Ioanna Tourkochoriti
University of Arkansas at Little Rock Law Review
No abstract provided.
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …
Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra
Secondary Liability, Isp Immunity, And Incumbent Entrenchment, Marketa Trimble, Salil K. Mehra
Scholarly Works
More than fifteen years have passed since the two major U.S. statutes concerning the secondary liability of Internet service providers were adopted--the Communications Decency Act and the Digital Millennium Copyright Act. The statutes have been criticized; however, very little of the criticism has come from Internet service providers, who have enjoyed the benefits of generous safe harbors and immunity from suit guaranteed by these statutes. This Article raises the question of whether these statutes contribute to incumbent entrenchment--solidifying the position of the existing Internet service providers to the detriment of potential new entrants. The current laws and industry self-regulation may …
Pinterest And Copyright's Safe Harbors For Internet Providers, Micheal W. Carroll
Pinterest And Copyright's Safe Harbors For Internet Providers, Micheal W. Carroll
University of Miami Law Review
No abstract provided.
In Search Of Safe Harbor: Suggestions For The New Rule 506(C), Usha Rodrigues
In Search Of Safe Harbor: Suggestions For The New Rule 506(C), Usha Rodrigues
Scholarly Works
I devote most of this essay to exploring how, exactly, the Securities and Exchange Commission (“SEC”) should go about providing guidelines to implement the statutory requirement that issuers have a reasonable belief that a purchaser is accredited. The SEC has proposed rules, but these rules merely restate what Congress has already required, thus sidestepping Congress’s direction that the agency itself articulate some verification methods. Taking the SEC’s decidedly amorphous proposal to task, I recommend that the SEC offer two nonexclusive safe harbors for issuers to guide them in determining whether a natural person is an accredited investor. The paragraphs below …
The Google Conundrum: Perpetrator Or Facilitator On The Net? - Forging A Fair Copyright Framework Of Rights, Liability And Responsibility In Response To Search Engine 2.0 - Part Ii: The Google Books Search Project, Warren B. Chik
Warren Bartholomew CHIK
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a …
Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba
Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba
Faculty Scholarship
Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …
The Google Conundrum: Perpetrator Or Facilitator On The Net? - Forging A Fair Copyright Framework Of Rights, Liability And Responsibility In Response To Search Engine 2.0 - Part Ii: The Google Books Search Project, Warren B. Chik
Warren Bartholomew Chik
Is Google in its quest for search engine optimization through the creation of new technologies, which not only improves its search algorithms but also refines its search functions for users, doing it in a manner that makes it a perpetrator of primary copyright infringement or an invaluable facilitator for Internet functionality? How should the balance of interests in the treatment of creative works be recalibrated in the face of changes in search engine technology and operations, and the disputes that have arisen within the last decade in the context of the digital age and its needs? Using Google as a …
Codes Of Ethics And State Fiduciary Duties: Where Is The Line?, Z. Jill Barclift
Codes Of Ethics And State Fiduciary Duties: Where Is The Line?, Z. Jill Barclift
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
Taking Healthcare's Pulse: Legal Issues Involved In Healthcare Business Transactions, Renee A. Pistone
Taking Healthcare's Pulse: Legal Issues Involved In Healthcare Business Transactions, Renee A. Pistone
The Journal of Business, Entrepreneurship & the Law
There are many federal regulations to consider when a healthcare lawyer creates and evaluates a particular healthcare business transaction. The healthcare market is highly competitive with the formation of healthcare business transactions on the rise. Hospitals and physicians seek dynamic and cost effective ways to deliver healthcare and partnerships are being formed between physicians and hospitals. These partnerships add to the marked increase in healthcare business transactions along with the progressed development of the physician hospital organization (“PHO”). Attorneys who execute healthcare business transactions on behalf of clients have to follow the federal laws. Part I sets forth potential ethics …
Three Approaches To Applying 11 U.S.C § 546(E)’S “Safe Harbor” To Private Lbos, Shlomo Lazar
Three Approaches To Applying 11 U.S.C § 546(E)’S “Safe Harbor” To Private Lbos, Shlomo Lazar
Bankruptcy Research Library
(Excerpt)
The Bankruptcy Code gives a trustee and a debtor-in-possession the authority to avoid fraudulent transactions. However, 11 U.S.C. § 546(e) limits the trustee’s avoiding powers by providing a safe harbor for “settlement payments.” Generally, a “settlement payment” is a payment of cash or securities made to complete a securities transaction. For example, money that an individual pays to a stockbroker to buy publicly traded shares is a settlement payment. A recent issue that has arisen is whether payments made to former shareholders in connection with a private leveraged buyout (LBO) constitute a “settlement payment.”
Depending on which jurisdiction a …