Volume 16

Jul
13

While Alice v. CLS Bank has confirmed that patent claims require a further “inventive concept” beyond an underlying abstract idea or law of nature for patent-eligibility, there is little agreement on what defines either an “abstract idea” or an “inventive concept.” Resolving this uncertainty is critical to determining the patent-eligibility of software claims beyond the

Jul
13

The Alice Court’s characterization of computer programming has effectively repudiated, inter alia, the doctrine that programming a general-purpose computer creates a patent-eligible “new machine.” This Article revisits In re Bernhart, the first holding based on the “new machine” principle, concluding that the Court of Customs and Patent Appeals committed a category mistake in conducting its

Apr
09

The mismatch of localized electricity regulations with interstate electricity generation and transmission creates large inefficiencies. It is possible to solve this problem without overturning the entire existing regime by affording federal, state, and local regulatory bodies more power to implement battery technology without traditional regulatory hindrances. Given the limited number of regulatory bodies responsible for

Apr
09

According to federal regulations, all students have a right to a free appropriate public education in the most integrated, least restrictive environment appropriate. Discrimination based upon disabilities is a violation of civil rights. An estimated 10.2 million children in the United States have special healthcare needs, accounting for 13.9% of all children. Some students who

Apr
09

Under the Supreme Court’s Fourth Amendment jurisprudence, the constitutional privacy protections that many Americans take for granted are non-existent in cyberspace because of the third-party doctrine, which was born decades before the popular adoption of cyberspace social networks and data storage services. When someone in America posts a picture on Instagram or updates a status

Apr
07

This article re-examines and revises observations made in the author’s 2009 article, Googlestroika: Privatizing Privacy. 1 Specifically, it looks to the contractual obligations and practical considerations that define how users interact not only with Google, but also with social network websites and other online service providers. Consideration is given to how an individual leaves a

Apr
07

Designing and implementing a cybersecurity legal policy is an ambitious endeavor. This Article offers primary guidelines focusing on the national level, and uses Israel’s newly created National Cyber Bureau as a case in point. Additionally, this Article offers a cross-section comparison between the national cybersecurity policies of the United States, the United Kingdom, Canada, Japan,

Categories