Skip to main content

Now showing items 6-10 of 12

Cyber-threats and the Limits of Bureaucratic Control

Brenner, Susan W. (2013-02-12)
For over half a decade, the author has been writing about how and why the institutions modern nation-states rely on to fend off the threats––war, crime, and terrorism––that can erode their ability to maintain order and ...

DIOS MIO—The KISS Principle of the Ethical Approach to Copyright and Right of Publicity Law

Murray, Michael D. (2013-02-12)
To copy or not to copy, to exploit the famous celebrity image or not to exploit it; these are the questions. The message of the modern legal world communicated through multiple voices in the academy is that copying often ...

Certificates of Confidentiality: Protecting Human Subject Research Data in Law and Practice

Wolf, Leslie E.; Patel, Mayank J.; Williams, Brett A.; Austin, Jeffrey L.; Lauren A., Dame (2013-02-12)
Researchers often require and collect sensitive information about individuals to answer important scientific questions that impact individual health and well-being and the public health. Researchers recognize they have a ...

Chimeric Criminals

Kaye, David H. (2013-02-12)
According to some commentators, an obscure genetic condition known as chimerism “could undermine the very basis of the forensic DNA system” and force a reconsideration of “the entire project of forensic DNA.” This conclusion ...

The Post-Grant Problem: America Invents Falling Short

Fossen, Kayla (2013-02-12)
Prior to the passage of the Leahy-Smith America Invents Act (AIA), the United States operated a patent system that was in many ways unique among developed nations. The patent prosecution system in the United States was a ...