The Beginning of a New Era for Law Librarians – Out With the Old, In With the New

POSTED BY Travis Bortz In a legal world that some perceive to be in a tailspin amidst a less than thriving economy, effectiveness and efficiency have become very important.  As law firms search for new ways to operate more leanly, the question arises whether or not there is a demand for law librarians.  Law librarians… Read More The Beginning of a New Era for Law Librarians – Out With the Old, In With the New

FCC Proposes Changes to Reinstate Net Neutrality

POSTED BY Edwin Batista Feeling the Pressure from politicians, the Federal Communications Commission (“FCC”) announced that plans to reinstate Net Neutrality will be released shortly. Despite suffering a legal defeat in a federal appeals court, the FCC was encouraged by the court’s decision, which threw out the FCC’s open Internet rules on a legal technicality. … Read More FCC Proposes Changes to Reinstate Net Neutrality

The Bitcoin: Regulating the Decentralized Digital Currency

POSTED BY Allison Kearns As investors swoon over the digital currency Bitcoin, regulators deal with questions of whether or how it should be regulated.   The Bitcoin is a decentralized virtual currency that is designed to mimic the mining of a commodity.  Except mining in the online arena consists of clients competing to solve cryptographic puzzles. … Read More The Bitcoin: Regulating the Decentralized Digital Currency

Educating Middle School Students on Internet Privacy

POSTED BY Hillary Cheng In conjunction with the Rappaport Center, Suffolk Law Professor Jessica Silbey is organizing a program to teach online privacy to Boston-area middle schoolers with the help of law student volunteers.  The program’s curriculum was developed at Fordham Law School, a project funded by a cy pres award in a settlement.  The… Read More Educating Middle School Students on Internet Privacy

Healthcare Software Companies Subject to Patent Suits but Relatively Safe from Trolls

POSTED BY Rebecca M. Ferrante In light of the controversy surrounding the less than elegant release of the federal government’s healthcare website in October 2013, there is much current discussion on the topics of both healthcare and technology.  Where these topics intersect resides a host of issues concerning software durability, patient privacy, and big data. … Read More Healthcare Software Companies Subject to Patent Suits but Relatively Safe from Trolls

Advertising Rules may be Applied to a Lawyer’s Blog

POSTED BY Caroline Carollo Earlier this year, the Virginia Supreme Court decided a case that sheds some light on the issue of how advertising rules for lawyers should apply to social media and other forms of electronic communications.  In Hunter v. Virginia State Bar, attorney Horace Hunter authored a non-interactive blog which was accessible from… Read More Advertising Rules may be Applied to a Lawyer’s Blog

Unweaving the Silk Road: The Deep Web and the [Almost] Perfect Virtual Escape

POSTED BY Rebecca Rubin Far below the all-seeing eye of the Internet lies the almost impenetrable and vast Deep Web. A relatively hidden virtual surface, out of reach of most standard search engines, technologically-savvy criminals have been able to set up Ebay-like platforms to make a quick buck. However, a recent October 2013 bust on… Read More Unweaving the Silk Road: The Deep Web and the [Almost] Perfect Virtual Escape

Counterterrorism, Counterproliferation, and Cybersecurity: Sidestepping American Expectations of Privacy to Further Foreign Initiatives

POSTED BY Laura Sousa Social graphs – representations of the interconnection of relationships in an online social network – define and link our social, professional, and family connections on social media.  They help us build relationships with others, see with whom our friends are connecting, and even increase our own interest base and social community. … Read More Counterterrorism, Counterproliferation, and Cybersecurity: Sidestepping American Expectations of Privacy to Further Foreign Initiatives

Clearing Your Cookies for Cheaper Travel: A Moot Myth?

POSTED BY Samantha Caplan As the online travel reservation market has grown over the past several years, so, too, have the number of theories for getting the best deals. A basic internet search reveals countless how-to guides and consumer tips (e.g., purchasing tickets on Tuesday afternoons, booking reservations six weeks in advance, et al.), some… Read More Clearing Your Cookies for Cheaper Travel: A Moot Myth?

3D Printing: A New Challenge To Intellectual Property Law

POSTED BY Nicholas Hasenfus 3D printers can be used to created objects out of materials such as metal, plastic, and nylon.  With a 3D scanner or 3D blueprints and a 3D printer, homeowners are able to create common household objects.  3D printers work differently than traditional machining techniques because printing is achieved using an additive… Read More 3D Printing: A New Challenge To Intellectual Property Law

Use of Facial Recognition Software Raises Privacy Concerns

POSTED BY Michael Yacubian Anyone remember that movie where Tom Cruise saves the world from the overbearing police state? No, not Cocktail. I’m talking about Minority Report, the one where he stops future crimes from happening by using “precognition”. Well, potential human psychic abilities aside, in the movie, after The Cruise ends up on the… Read More Use of Facial Recognition Software Raises Privacy Concerns

It’s a Name, It’s a Domain, It’s a…Contract For Services?

POSTED BY Alexander D. Schultheis There are a number of legal scholars who take the position that intellectual property (IP) is not that much different from real property.  Thus, many of the same ownership rights that exist in property law are advocated for in the realm of IP.  It seems reasonable from an objective viewpoint… Read More It’s a Name, It’s a Domain, It’s a…Contract For Services?

Gone “Phishing”

POSTED BY Rebecca Rubin Internet users are well-attuned to the prevalence of SPAM emails in their Inboxes. But really, some SPAM we assume is just clogging our Inboxes is merely an empty shell for a highly-intrusive hacking technique: phishing. Phishing is the reason SPAM emails can be so dangerous, and is the means employed to… Read More Gone “Phishing”

The Justice Department Attempts to Increase its Ability to Introduce Warrantless

POSTED BY Edwin Batista On Friday, October 25, 2013 the Justice Department gave notice that it was going to use information obtained from acquisition of foreign intelligence information authorized under the Foreign Intelligence Surveillance Act against suspected terrorist Jamshid Muhtorov. Muhtorov was charged with providing material support to the Islamic Jihad Union, a known foreign… Read More The Justice Department Attempts to Increase its Ability to Introduce Warrantless