Welcome to JHTL

at Suffolk Law

JHTL is student-run by an Editorial Board of past JHTL staff members. Students who become JHTL staff members are able to receive academic credit for working on a piece for publication, cite-checking, and writing a book review. The Editorial Board coordinates and supervises the research and writing development for all JHTL staff members. Staff members are selected through the summer write-on competition, and membership is open to all students who qualify, not just those concentrating in Intellectual Property.

A unique feature of JHTL as a Suffolk Law Honor Board is its ability to publish all articles online, which allows members to publish their materials while still at Suffolk. Making articles available on Westlaw, Lexis, and the JHTL Web site allows members of the legal community direct access to our timely articles, notes, and case comments.

For more information about the JHTL, please contact us at jhtl@jhtl.org.

If you are interested in submitting an Article for publication, please review our policy on Article Submissions.

Welcome to JHTL

Uber: Veering Off Course

Uber has been using a software called “Greyball” in order to evade law enforcement and public officials in cities and locations where where the company has faced opposition from people seeking to regulate ride-sharing applications. An issue may arise for Uber’s in-house counsel regarding the legal ethics of advising the company to utilize this software.

Print Friendly
Read More

Balancing Censorship and Hate Speech: Germany’s Approach to Blocking Illegal Content on Social Media in the Fake News Era

With the rise of fake news and hate speech easily publishable on the internet, some nation states have had enough. Germany has introduced a new law to impose heavy financial penalties on social media firms operating in Germany that do not comply with new takedown procedures related to illegal content.

Print Friendly
Read More

How to Export Encryption Products While Staying Compliant

Every contract for the purchase of encryption products will not be finalized without an ‘export control’ section that mentions International Traffic in Arms Regulations (ITAR) and Export Administration Regulation (EAR). As expected, defense contractors (contractors) are concerned with their proprietary information landing in the wrong hands during an international sale, specifically in the hands of rogue foreign persons. Thus, international sales are heavily regulated. My blog will analyze how international transactions for encryption products are effected by such ITAR and Export Control Act provisions.

Print Friendly
Read More

A Serious Outbreak of Distracted Driving

Distracted driving is nothing short of an epidemic these days. While a vast majority of people today are addicted to cellular technology, the main focus when it comes to curing this epidemic is getting people to put their phones away before they get behind the wheel. This goal however does not appear to be aimed towards ride sharing services such as Uber and Lyft where the use of a cellular device is the crucial element giving them a competitive advantage. The topic of debate with regard to ride sharing services and distracted driving is really whether these companies should be more strictly regulated when it comes to cellular use behind the wheel.

Print Friendly
Read More
Book review

2015 – 2016

Anticipating Child Exploitation due to Blurred Boundary Lines by Media and Society

Written by Holly A. Smith and reviewed by Angelica Diaz

e-Discovery: The Untold Story of my Quest for Justice

Written by Laura A. Zubulake and reviewed by Caroline Murphy


In conjunction with Suffolk Law’s Intellectual Property Concentration, and under the guidance of Professor Andrew Beckerman-Rodau, JHTL produces a series of podcasts on topical issues of law, technology, and IP:

Introduction Podcast

Welcome to the JHTL Podcast 2015-2016 series! In this episode we introduce the creators and interviewers Jerry Chapin, Andrew Glenny, and Olivia Vaché, all students at Suffolk University Law School interested and/or studying technology in law.

  • Uber: Veering Off Course
    By Noelle Phelan In recent years, use of ride sharing technology such as Uber has become an increasingly popular way to get around. However, as the application’s popularity has increased, so have the amount of regulations many cities have attempted to place on the company. In order to ensure a fair market, and safety for…
  • Balancing Censorship and Hate Speech: Germany’s Approach to Blocking Illegal Content on Social Media in the Fake News Era
    By Conor L. McSweeney The Cabinet of Germany recently approved a draft bill of legislation targeting social media firms with significant financial penalties if they fail to remove illegal content within statutorily defined timeframes. The Cabinet is representative of the leading ministers from the ruling coalition of parties in the Parliament of the Federal Republic…
  • How to Export Encryption Products While Staying Compliant
    By Brandon Basso Every defense contract for the acquisition of encryption products will have an ‘export control’ section that states the following: “U.S. export law as contained in the International Traffic in Arms Regulations (ITAR) and the Export Administration Regulation (EAR) is applicable to any controlled technical data provided under this Agreement.  Any such controlled…
  • A Serious Outbreak of Distracted Driving
    By Melissa Dobstaff As legislators are taking serious notice of the distracted driving epidemic and the role that cell phone use plays in making our roads more dangerous than ever before, one area that appears to fall through the cracks involves Uber.  As a ride sharing service, Uber designed an app that allows customers to…
  • Watson, The Firm’s Newest Associate
    By Jordan Bigda The CEO of IBM recently stated that Watson will be used by more than 1 billion consumers by the end of 2017.  Watson is a form of artificial intelligence (AI) created by IBM that can think cognitively, like a human.  IBM states that Watson works with “businesses, scientists, researchers and governments to…
  • The EU General Data Protection Regulations: Why U.S. Entities Should be Concerned about a European Regulation
    By Marco Garbero The GDPR, to be enforced in May 2018, is the European’s Union’s (EU) attempt to shore up its data control and protect EU citizens from inadequate data protection safeguards.  While that may seem on the surface to be very specific, the GDPR is greatly increasing its scope to include entities that process…
  • Should Intelligence Agencies Have Access to Encrypted Messages?
    By Gabrielle King As tragic terror attacks continue to occur throughout the world, many are wondering whether there are ways to prevent these attacks. Intelligence agencies utilize their resources to learn more about the terrorists planning these attacks. This includes receiving information about the suspect’s communications with others which could assist in identifying coconspirators and…
  • And the Internet’s Next Top Domain Name is…. A look at the latest gTLDs.
    By Kaitlyn Stone Our world is ruled by the internet. It is how we get our news, how we communicate with friends and family, how we entertain ourselves and how we shop. An animated debate between friends turns into someone pulling out their phone to Google the answer. A screaming toddler in the super market…
Print Friendly
Skip to toolbar