Blogs

Oct
03

Thursday, October 3, 2013, by Nicholas Turza That the President frequently employs drone strikes against national security threats – mainly Al-Qaeda and their ilk in hiding spots such as Pakistan and Yemen – is certainly no secret. But the legal authority under which those operations is, literally, the code of secrets. Rather than operating under

Oct
03

Thursday, October 3, 2013, by Catherine Perez The O’Bannon vs NCAA, EA Sports, and CLC lawsuit has been the hot topic of NCAA advocacy for months. Although originally filed in 2009, the suit took a significant turn in July when the District Court of Northern California rejected EA Sports’ proposed First Amendment defense. This left

Oct
01

Tuesday, October 1, 2013, by Daniel Parisi A tornado of patent reform proposals are currently being considered in Congress which pose risks of premature action and dangerous infringement on traditional judicial authority.  Congress should take its time and not get swept away.  In a keynote speech on September 17, 2013, Honorable Federal Circuit Judge O’Malley

Sep
26

Thursday, September 26, 2013, by Britton Lewis In recent months, Nevada, New Jersey, and Delaware have legalized and begun regulating online gambling, although any attempt at reaching a federal consensus has stalled among the legislature.  The legality and credibility of online gambling has been, at best, ambiguous since 2011 when the Department of Justice indicted

Sep
24

Tuesday, September 24, 2013, by Tony Lucas In a tweet, nearly two weeks ago, Twitter announced publicly that it had confidentially submitted IPO registration documents with the Securities and Exchange Commission (SEC).  The tweet reignited a debate over the Jumpstart Our Business Startups (JOBS) Act, signed by the President Obama last April.  However, Twitter is

Sep
19

Thursday, September 19, 2013, by Christian Landreth Excitement surrounding the September 20, 2013 release of the iPhone 5s has been somewhat tempered by privacy concerns related to Apple’s new Touch ID technology. Touch ID is a security feature that “uses a laser cut sapphire crystal, together with the capacitive touch sensor, to take a high-resolution

Categories