Skip to main content Skip to main navigation menu Skip to site footer
University of Pittsburgh Technology Law & Policy
  • Current
  • Archives
  • Announcements
  • About
    • About the Journal
    • Submissions
    • Editorial Team
    • Privacy Statement
    • Contact
  • Login
  1. Home /
  2. Search

Search

Advanced filters
Published After
Published Before

Search Results

Found 177 items.
  • Volume XXI Issue 2 Front Matter

    Pittsburgh Journal of Technology Law and Policy
    2021-09-21
  • The Use of Race in Medical Artificial Intelligence

    Priya Desai
    2021-08-26
  • For Profit or For Health? It is Time to Reckon With the Current Pharmaceutical Landscape Through a Systematic Analysis of Monoclonal Anitbodies

    Alexander Snyder
    2021-08-26
  • Me-FAS, You-FAS, We All Eat PFAS: What To Do About the Forever Chemical

    Noel M. Johnson
    2021-05-19
  • Patent Eligibility: Exploring the Intersection Between Patent Law and Biomedical Data

    Erin A. Napoleon
    2021-05-12
  • Biometric Monitoring Devices: Modern Solutions to Protecting Athletes’ Data Privacy

    Tristan A. Dietrick
    2021-04-22
  • Nano-drug Clinical Trials: Informed Consent and Risk Management Through Blockchain

    Yousef Haik, Ilias Bantekas
    2021-03-17
  • Babyproofing the House Before the Hurricane: Where We are Missing the Mark

    Anokhy Desai
    2021-01-28
  • Big Data and "New Surveillance": Is International Regulation Feasible?

    Leanne Winkels
    2021-01-28
  • The Convolution Addressing the Conundrum of Liability and Privacy in the Age of Autonomous Vehicles

    Aarushi Kapoor, Khushi Sharma
    2021-02-22
  • Children’s Right to Privacy on the Internet in the Digital Age

    Bethany Brown
    2020-05-07
  • Time for Reapplication: A Review of FDA Sunscreen Regulation & Why it Needs an Update

    Emily Davidson
    2020-05-07
  • Squaring the Circle Between Freedom of Expression and Platform Law

    Michael Karanicolas
    2020-05-07
  • Privacy, Risk, Anonymization and Data Sharing in the Internet of Health Things

    Liane Colonna
    2020-04-06
  • Governance of the Facebook Privacy Crisis

    Lawrence J. Trautman
    2020-03-27
  • Front Matter

    Pittsburgh Journal of Technology Law & Policy
    2020-01-08
  • Can the CCPA Access Right Be Saved? Realigning Incentives in Access Request Verification

    Rebecca Iafrati
    2020-02-12
  • Autonomous Vehicles: A Future Fast Approaching With No One Behind the Wheel

    Sean Bollman
    2020-01-07
  • Understanding the Promises and Pitfalls of Outer Space Mining and the Need for an International Regulatory Body to Govern the Extraction of Space-Based Resources

    Mitchell Powell
    2019-05-24
  • Missing Links: The First Amendment's Place in an Ever-Changing Web

    Erin M. Holliday
    2019-04-24
  • Improving the Transparency of the Pharmaceutical Supply Chain through the Adoption of Quick Response (QR) Code, Internet of Things (IoT), and Blockchain Technology: One Result: Ending the Opioid Crisis

    Justin D. Evans
    2019-03-07
  • Front Matter

    Pittsburgh Journal of Technology Law & Policy
    2019-01-31
  • Calculating Corporate Compliance & The Foreign Corrupt Practices Act

    Brian S. Haney
    2019-01-31
  • Front Matter

    Pittsburgh Journal of Technology Law & Policy
    2018-05-03
  • Airport Security: Over-Reaching New Heights

    Cole Antolak
    2018-04-20
  • Tribal Sovereign Immunity as a Defense in Overcoming IPR Challenges of Brand Name Pharmaceutical Patent Validity at PTAB – Effects on the Industry

    Elana Williams
    2018-03-28
  • Pioneers in Computerized Legal Research: The Story of the Pittsburgh System

    Tina Batra Hershey, Donald Burke
    2018-02-07
  • Foreword

    PJTLP Staff
    2017-12-12
  • The Antisocial Effects of Social Media and How Colleges and Universities Can Manage Related Litigation Risks

    Gregory L. Demers, J. William Piereson, Mark A. Cianci, Peter L. Welsh
    2017-12-19
  • Front Matter

    Jonathon Mason
    2017-07-06
  • Walk Out Technology: The Need to Amend Section 5 of the Federal Trade Commission Act to Protect Consumer Privacy and Promote Corporate Transparency

    Alexandra Menosky
    35-52
    2017-07-06
  • 3-D Printed Guns: A Developing Technology with Dangerous Potential

    Jonathan Danielczyk
    17-34
    2017-07-06
  • Wearable Evidence: Why the Pennsylvania Judiciary Should Require a Warrant to Search Wearable Technology

    Pat Augustine
    1-16
    2017-07-06
  • Volume XVI Issue 2 Front Matter

    J.D. Mason
    2016-12-07
  • Reviving Spent Nuclear Fuel Reprocessing in the U.S.

    Emily M. Farah
    51-76
    2016-12-07
  • Smartphones, Nude Snaps, and Legal Loopholes: Why Pennsylvania Needs to Amend its Revenge Porn Statute

    Vanessa Nicholle Griffith
    1-21
    2016-12-07
  • Paying the Pied Piper: An Examination of Internet Service Provider Liability for Third Party Speech

    Joseph E. Brenner
    22-50
    2016-12-07
  • It's not always Sunny in Philadelphia: The Problem with the Pennsylvania Solar Initiatives

    Christina Alam
    77-100
    2016-12-07
  • Table of Contents

    Paul Coury
    2016-04-01
  • Foreword

    Daniel Harris Brean
    1-5
    2016-04-01
  • Spectrum Sharing in the Context of Vehicle-to-Vehicle Technology: Bureaucratic Hoops, Fierce Competition, Political Maneuverings, and the Larger Policy Issue

    Colleen A. Mallick
    116-134
    2016-04-01
  • Connected Vehicle Technology: An All Too Convenient Solution to Roadway Problems in the United States

    Victor Kustra
    101-115
    2016-04-01
  • Police Body Cameras: Mending Fences and How Pittsburgh is a Leading Example

    Danielle Evans
    76-100
    2016-04-01
  • Microbiomes Germ Clouds and the Future of DNA Jurisprudence

    Jade Salyards
    58-75
    2016-04-01
  • Forging a Balanced Presumption in Favor of Metadata Disclosure Under the Freedom of Information Act

    Ben Minegar
    23-57
    2016-04-01
  • The Use of Non-Confidential and Limited Confidential Information Obtained by Metadata Mining Outside the Context of Discovery Should Be Ethically Permissible

    Michelle K. Chu
    6-22
    2016-04-01
  • Spring 2015 Table of Contents and Publication Information

    Samuel Franklin
    2015-08-21
  • Weaponized Police Drones and Their Effect on Police Use of Force

    Kyle Stelmack
    276-292
    2015-08-21
  • Embracing the Imminent: Proposed Legislation for Automated Cars in Pennsylvania

    Katelyn Sheinberg
    265-275
    2015-08-21
  • Recreational UAVs: Going Rogue with Pennsylvania's Strict Products Liability Law Post-Tincher

    Lindsey E. Buckley
    243-264
    2015-08-21
  • Prioritizing Demand Response: How Federal Legislation and Technological Innovation Changed the Electricity Supply Market and the Need to Revitalize FERC Order 745

    Bradley J. McAllister
    162-196
    2015-08-21
  • The Chilling Realities of the Telecommuting Tax: Adapting Twentieth Century Policies for Twenty-First Century Technologies

    Michael Kraich
    224-242
    2015-08-21
  • America Invents Act's Prior User Defense: Lessons from Global Patent Regimes and Legislative History

    Aleksey Khamin
    132-161
    2015-08-21
  • Elonis v. United States: The Doctrine of True Threats: Protecting Our Ever-Shrinking First Amendment Rights in the New Era of Communication

    Mary Margaret Roark
    197-223
    2015-08-21
  • Fall 2014 Table of Contents and Publication Information

    Samuel Franklin
    i-iv
    2015-02-10
  • A Telehealth Technicality: Pennsylvania's Outdated Insurance Reimbursement Policies Deter Investment in Modern Telehealth Technology

    Gabrielle Lee
    115-131
    2015-02-10
  • Behavioral Recognition: Computer Algorithms Alerting Law Enforcement to Suspicious Activity

    J Darwin King, Jr.
    101-114
    2015-02-10
  • Regulating Rideshare Without Stifling Innovation: Examining the Drivers, the Insurance "Gap," and Why Pennsylvania Should Get on Board

    Catherine Lee Rassman
    81-100
    2015-02-10
  • Introduction: Realizing the Potential of the Tech Economy as a Driver of Equitable Growth

    William Peduto
    77-80
    2015-02-10
  • Trademark Protection in Bankruptcy Proceedings: A Closer Look at Lubrizol and its Progeny

    Endia Vereen
    57-76
    2015-02-10
  • A Medium of Exchange for an Internet Age: How to Regulate Bitcoin for the Growth of E-Commerce

    Jeremy Papp
    33-56
    2015-02-10
  • China vs. United States: A Cosmopolitan Copyright Comparison

    Amy Rosen
    1-32
    2015-02-10
  • Spring 2014 Table of Contents and Publication Information

    Chris Schlag
    i-iv
    2014-05-23
  • An Era of Rapid Change: The Abdication of Cash & the FTC's Unfairness Authority

    Elie Freedman
    351-382
    2014-05-23
  • Cyber-Takings: The War on Crime Moves into the Cloud

    Larry McIntyre
    333-350
    2014-05-23
  • Throwing New Flags: Should There Be Criminal Sanctions or a Better Chance of Civil Sanctions for Lawyers or Service Providers Who Breach Confidentiality?

    Lea L. Lach
    315-332
    2014-05-23
  • A Voluntary Cybersecurity Framework Is Unworkable- Government Must Crack the Whip

    Robert Gyenes
    293-314
    2014-05-23
  • What Does It Take to Survive a Breach in Today’s High- Risk World? When Your Prevention Fails (and It’s Going to Fail), What Do You Do?

    Scott M. Angelo
    280-292
    2014-05-23
  • Creating a Model of Cyber Proficiency: Remodeling Law Enforcement Tactics in Pittsburgh to Address the Evolving Nature of Cybersecurity

    Elizabeth Orton, Chris Schlag
    276-279
    2014-05-23
  • Introduction: Cybersecurity in Pittsburgh

    Kevin D. Ashley
    273-275
    2014-05-23
  • Too Much Too Soon? A Case for Hesitancy in the Passage of State and Federal Password Protection Laws

    Megan Davis
    253-272
    2014-05-23
  • An Argument for States to Outlaw 'Revenge Porn' and for Congress to Amend 47 U.S.C. §230: How Our Current Laws Do Little to Protect Victims

    Casey Martinez
    236-252
    2014-05-23
  • Mining the Final Frontier: Keeping Earth's Asteroid Mining Ventures from Becoming the Next Gold Rush

    Matthew Feinman
    202-235
    2014-05-23
  • Break on Through: An Analysis of Computer Damage Cases

    Ioana Vasiu, Lucian Vasiu
    158-201
    2014-05-23
  • Fall 2013 Table of Contents and Publication Information

    University of Pittsburgh School of Law JTLP
    i-iv
    2014-02-12
  • GasFrac: A Cost-Benefit Analysis of Hydraulic Fracturing with Liquified Petroleum Gas Gel

    B. Tyler Wilson
    142-157
    2014-02-12
  • Crossing the Line: Selective Licensing of Liquefied Natural Gas Exportation Facilities is Unconstitutional

    Rebecca Kennedy
    128-141
    2014-02-12
  • Fighting the Good Fight: Why the So-Called “War on Coal” is Beneficial for Pittsburgh’s Future

    James Lee
    95-113
    2014-02-12
  • From Gray to Green-Using Algal Biofuels to Change the Energy Landscape of Southwestern Pennsylvania

    Rebecca Hammond
    114-127
    2014-02-12
  • Introduction: Law, Technology, and Energy in Pittsburgh

    Jeffrey Roberts, Matthew Brouse
    88-94
    2014-02-12
  • Give Me Your PASSWORD because Congress Can Say So: An Analysis of Fifth Amendment Protection Afforded Individuals Regarding Compelled Production of Encrypted Data and Possible Solutions to the Problem of Getting Data from Someone’s Mind

    Michael Wachtel
    44-87
    2014-02-12
  • Internet Control or Internet Censorship? Comparing the Control Models of China, Singapore, and the United States to Guide Taiwan’s Choice

    Jeffrey (Chien-Fei) Li
    1-43
    2014-02-12
  • Masthead & General Information

    JTLP JTLP
    2013-05-30
  • The Proper Basis for Exercising Jurisdiction in Internet Disputes: Strengthening State Boundaries or Moving Towards Unification?

    Niloufer Selvadurai
    2013-05-30
  • The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights

    Chris Schlag
    2013-05-30
  • Drawing the Line: The Legality of Using Wiretaps to Investigate Insider Trading

    Shane Miller
    2013-05-30
  • First Amendment Concerns in Governmental Acquisition and Analysis of Mobile Device Location Data

    Gerald J. Votava III
    2013-05-30
  • Ill Suited to the Digital Age: Fourth Amendment Exceptions and Cell Site Location Information Surveillance

    Michael T.E. Kalis
    2013-05-30
  • The Failure of State Texting-While-Driving Laws

    Cody J. Harding
    2013-05-30
  • Jailbroken: Examining the Policy and Legal Implications of iPhone Jailbreaking

    Kevin Rogers
    2013-05-30
  • Smartphone Wars: Emphasizing eBay's First Two Factors in Smartphone Patent Injunctions

    Christianna Edrington
    2013-05-30
  • Being Social: Why the NCAA Has Forced Universities to Monitor Student-Athletes' Social Media

    Jamie P. Hopkins, Katie Hopkins, Bijan Whelton
    2013-05-30
  • Copyright in the Mobile Media Era

    Krysta M. Smith
    2013-05-30
  • Based on an Almost True Story: Providing Real Life Protection to Real Life Characters

    Brandy S. Ringer
    2012-12-21
  • Technology, Residuals, and the New Threat to Hollywood Screenwriters

    Kevin Leary
    2012-12-21
  • Unique Legal Considerations in Reality Television

    Katie Hopkins
    2012-12-21
  • Through A Router Darkly: How New American Copyright Enforcement Initiatives May Hinder Economic Development, Net Neutrality and Creativity

    Peter Groh
    2012-12-21
  • Storm Fronts and Filmmaking: Cloud Computing Regulation and the Impact on Independent Filmmakers

    Gregory Graham
    2012-12-21
  • There’s No Business Like the State Film Tax Incentive Business: An Analysis of Pennsylvania’s Film Production Tax Credit Program

    Ashley W. Edwards
    2012-12-21
  • Introduction: Law, Technology, and Entertainment in...Pittsburgh?!?

    Steeltown Entertainment Project
    2012-12-21
  • Transformative Technology in Microfinance: Delivering Hope Electronically?

    Shanthi Elizabeth Senthe
    2012-12-20
  • The Constitutionality of DNA Sampling of Arrestees

    Anip Patel
    2012-12-21
  • Interpreting the Computer Fraud and Abuse Act

    Lee Goldman
    2012-12-20
  • MOBILE REMITTANCES AND DODD-FRANK: REVIEWING THE EFFECTS OF THE CFPB REGULATIONS

    Colin C. Richard
    288-312
    2012-04-13
  • A PATENT PRIZE SYSTEM TO PROMOTE DEVELOPMENT OF NEW ANTIBIOTICS AND CONSERVATION OF EXISTING ONES

    Mark Nickas
    255-287
    2012-04-13
  • HARMONIZING THE DOCTRINES OF ENABLEMENT AND OBVIOUSNESS IN PATENT LITIGATION

    Roy D. Gross
    238-254
    2012-04-13
  • SMARTPHONE USAGE AND THE NEED FOR CONSUMER PRIVACY LAWS

    Laura E. Gomez-Martin
    217-237
    2012-04-13
  • RISING TOWARD APOTHEOSIS: THE DECONSTRUCTION OF THE WSIS TUNIS AGENDA FOR THE INFORMATION SOCIETY

    Roy Balleste
    181-216
    2012-04-13
  • DIMINISHING THE ATTRACTIVENESS OF TROLLING: THE IMPACTS OF RECENT JUDICIAL ACTIVITY ON NON-PRACTICING ENTITIES

    Holly Forsberg
    153-180
    2012-04-13
  • CODING FOR LIFE - SHOULD ANY ENTITY HAVE THE EXCLUSIVE RIGHT TO USE AND SELL ISOLATED DNA?

    Douglas L. Rogers
    85-152
    2012-04-13
  • TAXING VIRTUAL WORLDS: CAN THE IRS PWN YOU?

    Eric G. Roscoe
    50-84
    2012-04-13
  • THE "LEGAL EPIDEMIOLOGY" OF THE TEEN SEXTING EPIDEMIC: HOW THE MEDIA INFLUENCED A LEGISLATIVE OUTBREAK

    Kimberlianne Podlas
    1-49
    2012-04-13
  • Front Matter Volume XII Spring 2012

    J JTLP
    V-VIII
    2012-04-13
  • Front Matter Volume XII Fall 2011

    J JTLP
    I-IV
    2012-04-13
  • Front Matter Volume VIII Fall 2007

    Pittsburgh Journal of Technology Law & Policy
    2008-04-01
  • Front Matter Volume XI Spring 2011

    Pittsburgh Journal of Technology Law & Policy
    2011-04-01
  • Front Matter Volume XI Fall 2010

    Pittsburgh Journal of Technology Law & Policy
    2011-04-01
  • Front Matter Volume X Fall 2009

    Pittsburgh Journal of Technology Law & Policy
    2010-04-01
  • Front Matter Volume X Spring 2010

    Pittsburgh Journal of Technology Law & Policy
    2010-04-01
  • Front Matter Volume IX Spring 2009

    Pittsburgh Journal of Technology Law & Policy
    2009-04-01
  • Perspectives from the Bench: Technology in the Pittsburgh Courtroom An Interview with the Honorable Nora Barry Fischer, District Judge for the United States District Court for the Western District of Pennsylvania

    Katie Angliss
    2011-04-01
  • Perspectives from the Bench: Patent Law in Pittsburgh An Interview with the Honorable Joy Flowers Conti, District Judge for the United States District Court for the Western District of Pennsylvania

    Katie Angliss
    2011-04-01
  • Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It

    Meiring deVilliers
    2011-04-01
  • The Page You Are Attempting to Access Has Been Blocked in Accordance with National Laws: Applying a Corporate Responsibility Framework to Human Rights Issues Facing Internet Companies

    Emily C. Miletello
    2011-04-01
  • Is It Time to Revisit Trademark Misuse?

    Scott H. Brown
    2011-04-01
  • Playing Legislative Catch-up in 2010 with a Growing, High-Tech Phenomenon: Evolving Statutory Approaches for Addressing Teen Sexting

    Clay Calvert, Kara Carnley Murrhee, Jackie Marie Steve
    2011-04-01
  • ESRB Warning: Use of Virtual Worlds by Children May Result in Addiction and Blurring of Borders – The Advisable Regulations in Light of Foreseeable Damages

    Nachson Goltz
    2011-04-01
  • Sources of Law and Modes of Governance: Ethnography and Theory in Second Life

    Claude T. Aiken, IV
    2010-04-01
  • How the Sarbanes-Oxley Act Has Knocked the “SOX” off the DOJ and SEC and Kept the FCPA on Its Feet

    Laura E. Kress
    2010-04-01
  • Prohibition’s Pending Demise: Internet Gambling & United States Policy

    K. Alexa Koenig
    2010-04-01
  • Bringing the Question of Chinese IPR Enforcement to the WTO Under TRIPS: An Effective Strategy or a Meaningless and Overused Tactic by the U.S.?

    Jung Yun (Jennifer) Yang
    2010-04-01
  • Google Street View: Walking the Line of Privacy-Intrusion upon Seclusion and Publicity Given to Private Facts in the Digital Age

    Jordan E. Segall
    2010-04-01
  • Mural Rights: Establishing Standing for Communities Under American Moral Rights Laws

    Christian Ehret
    2010-04-01
  • “Too Legit to Quit”: Free Speech Clause Protection For Frequency Hopping Spread Spectrum Broadcasters

    Jonathan A. Messier
    2009-04-01
  • Impact of Global Patent and Regulatory Reform on Patent Strategies for Biotechnology

    Vincent J. Napoleon
    2009-04-01
  • A 'Sound' Policy? The RIAA and The Copyright Act

    Chadwick Schnee
    2009-04-01
  • The Girl Talk Dilemma: Can Copyright Law Accomodate New Forms of Sample-Based Music?

    David Mongillo
    2009-04-01
  • Mineshafts on Treasure Island: A Relief Map of the eBay Fraud Landscape

    Mary M. Calkins, Alexei Nikitkov, Vernon Richardson
    2008-04-01
  • A Tangled Web We Weave: Enforcing International Speech Restrictions in an Online World

    Gregory S. Cooper
    2008-04-01
  • The Communications Decency Act of 1996: Why § 230 is Outdated and Publisher Liability for Defamation Should be Reinstated Against Internet Service Providers

    Matthew G. Jeweler
    2008-04-01
  • The Future of Cameras in the Courts: Florida Sunshine of Judge Judy

    Elizabeth A. Stawicki
    2008-04-01
  • Would You Like that iPhone Locked or Unlocked?: Reconciling Apple's Anticircumvention Measures with the DMCA

    Daniel J. Corbett
    2008-04-01
  • International E-Discovery: Navigating the Maze

    Erica M. Davila
    2008-04-01
  • Price Fix Away?: Does the Supreme Court’s Decision in Leegin Creative Leather Products Strengthen the Ability of Businesses to Engage in Vertical Price Restraints with Impunity?

    Erick S. Lee
    2008-04-01
  • Scare of Avian Flu Revisits India: A Bumpy Road Ahead

    Rajnish Kumar Rai
    2008-04-01
  • Legal Defect Protected by Article 42 of the CISG: A Wolf in Sheep’s Clothing

    Thomas M. Beline
    2007-04-01
  • Flying the Friendly Skies May Not be so Friendly in Outer Space: International and Domestic Law Leaves United States’ Citizen Space Tourists without a Remedy for Injury Caused by Government Space Debris

    Marla Stayduhar
    2007-04-01
  • “I Just Bought a Flat Screen T.V. in Kolkata?” Application of Laws for International Outsourcing Related Identity Theft

    Samantha Grant
    2007-04-01
  • The Limitations of “Information Privacy” in the Network Environment

    Jisuk Woo, Jae-Hyup Lee
    2007-04-01
  • Undampened Oscillations in the Circuit: Combining the Components of 271(f) Doctrine Supplied by the Federal Circuit

    Benjamin J. Byer
    2007-04-01
  • Computer Forensics, Search Strategies, and the Particularity Requirement

    Wayne Jekot
    2007-04-01
  • Impeaching Finnigan and Realigning the Corroboration Standard for Uninterested Single Witness Testimony with Precedent and Policy

    Jessica R. Underwood
    2007-04-01
  • Regulatory Disparity: The Constitutional Implications of Communications Regulations That Prevent Competitive Neutrality

    Ryan K. Mullady
    2007-04-01
  • Keeping Time Machinese and Teleporters in the Public Doman: Fiction as Prior Art for Patent Examination

    Daniel H. Brean
    2007-04-01
  • Searching for Initial Interest Confusion im Trademark Protection in Cyberspace

    David M. Fritch
    2006-04-01
  • Escaping Davy Jones' Locker: How the Motion Picture Industry Can Stop Digital Piracy Without Unnecessary Litigation

    Robert H. Wright
    2006-04-01
  • Security Interests in Patents and Patent Applications?

    Pauline Stevens
    2006-04-01
  • When Two Worlds Collide: Ownership of Genetic Resources unde rthe Convention on Biological Diversity and the Agreement on Trade-Related Aspects of Intellectual Property Rights

    Greg K. Venbrux
    2006-04-01
  • Who's Walking the Plank?: The Recording Industry's Fight to Stop Music Piracy

    James Dye
    2006-04-01
  • The National Counterterrorism Center: Foreign and Domestic Intelligence Fusion and the Potential Threat to Privacy

    Bennie G. Thompson
    2006-04-01
  • Online Casino Advertising: Testing the Limits of Commercial Speech

    Andrew Hall
    2006-04-01
  • Doe v. Ashcroft and Its Place in the Judicial Trend: How the Courts Have Advanced Civil Liberties in Step with Advances in Technology

    Craig M. Glasgow
    2006-04-01
  • Toward a Criminal Law for Cyberspade: Product Liability and Other Issues

    Susan W. Brenner
    2005-04-01
  • What's in Your Bottle?: Shire US Inc. v. Barr Laboratories Inc. and Its Effect on Prescription Drug Trade Dress Protection in the Third Circuit

    Aaron M. Pile
    2005-04-01
  • High Tech Hunks of Steel: Fixed-Site Amusement Rides and Safety Under State Regulation

    Jennifer Kingsley
    2004-04-01
  • Forgery in Cyberspace: The Spoof Could Be on You!

    Stephanie Austria
    2004-04-01
  • Pre Embryos: The Tiniest Spect of Potential Life Carrying the Seeds for Sweeping Change

    Kathryn L. Miehl
    2004-04-01
  • Rewarding Creativity: Transformative Use in the Jazz Idiom

    Stephen R. Wilson
    2004-04-01
  • Drafting Intellectual Property Joint Venture Agreements with an Eye Toward Termination

    Jackie Taylor
    2004-04-01
  • The Fine Line between Security and Liberty: The "Secret" Court Struggle to Determine the Path of Foreign Intelligence Surveillance in the Wake of September 11th

    Jessica M. Bungard
    2004-04-01
  • Just When U Thought it was All Over, Gator's Kin Pops Up and Slides Out of Dangerous IP Waters (for the Most Part): A Review of Two Online Pop-Up Advertisers and 4 Internet Law Decisions

    Jason Allen Cody
    2004-04-01
  • The DMCA and Researchers' First Amendment Rights

    Amy E. McCall
    2003-04-01
  • Legislating Limits on Human Embryonic Stem Cell Research

    Sïna A. Muscati
    2003-04-01
  • The Future of Law Reviews and Legal Journals From a Student Editor's Perspective

    Bradley J. Martineau
    2002-04-01
  • Alcohol Ignition Interlocks: Magic Bullet or Poison Pill?

    Gregory T. Neugebauer
    2002-04-01
  • Personal Jurisdiction Over The Internet: How International Is Today's Shoe

    Jamie Spataro
    2002-04-01
  • Interpretation of Consent Decrees and Microsoft v. United States I: Making Law in the Shadow of Negotiation

    Lloyd C. Anderson
    2001-04-12
1 - 177 of 177 items

Keywords


This journal is published by Pitt Open Library Publishing.
ISSN 2164-800X (online)

More information about the publishing system, Platform and Workflow by OJS/PKP.