The Big Data Collection Problem of Little Mobile Devices
There should be little question that mobile device-based data are discoverable if relevant. However, as was the case with ordinary computer-based data a decade or more ago, there is a tendency to...
View ArticleWherever You Go, There You Are (With Your Mobile Device): Privacy Risks and...
The cross-use of mobile devices for personal and professional purposes—commonly referred to as “Bring Your Own Device” or “BYOD” for short—has created a new backdrop for doing business that was...
View ArticleCover Letter
The Richmond Journal of Law and Technology is proud to present its fourth and final issue of the Twenty-First Volume. At its inception in 1995 JOLT became the first law review to be published...
View ArticleConducting U.S. Discovery in Asia: An Overview of E-Discovery and Asian...
The rapid expansion over the last decade of Asian corporations doing business in the United States and U.S. corporations doing business in Asia, has led to a marked increase in U.S. litigation...
View ArticleWelcome to the Machine: Privacy and Workplace Implications of Predictive...
Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. The volume of information that people create...
View ArticleCommercial Drones and Privacy: Can We Trust States with ‘Drone Federalism’?
Judge Andrew Napolitano said recently of unmanned aircraft systems (“UAS”), or “drones,” that “[t]he first American patriot that shoots down one of these drones that comes too close to his children in...
View ArticleEnding Drunk Driving with a Flash of Light
Drunk driving exacts an enormous toll on our society. Every year, alcohol-driven crashes kill over ten thousand people, injure hundreds of thousands more, and cost the national economy tens of...
View ArticleCan I Call You Back? A Sustained Interaction With Biospecimen Donors To...
"For the cure." This statement resonates throughout society and offers a simple reasoning for the conduct of biomedical research. It provides a strong impetus for advocates of biomedical research to...
View ArticleMLAT Jiu-Jitsu and Tor: Mutual Legal Assistance Treaties in Surveillance
A corrupt Australian Law Enforcement Agency (LEA) wishes to track the communications of a journalist who has published leaked whistleblowing documents from a confidential source, revealing the...
View ArticleRegulating Healthcare Robots: Maximizing Opportunities While Minimizing Risks
Some of the most dynamic areas of robotics research and development today are healthcare applications. Robot-assisted surgery, robotic nurses, in-home rehabilitation, and eldercare robots' are all...
View ArticleMerger and Acquisition Due Diligence Part II- The Devil in the Details
Our prior scholarship examined the legal and technical challenges involved in modern Merger & Acquisition ("M&A") due diligence practices associated with transactions ("Deals"), given recent...
View ArticleSweeten the Deal: Transfer of Federal Spectrum Through Overlay Licenses
The explosion in consumer demand for wireless services that began in the 1990s caught policymakers off guard. Demand for wireless services has only accelerated, as new cellular wireless...
View ArticleAddressing Employee Use of Personal Clouds
Cloud computing is one of the most useful innovations in the digital age. While much of the attention on recent advances has focused on smartphones, tablet computers, and wearable technology, the...
View ArticlePreservation: Competently Navigating Between All and Nothing
Merriam-Webster defines "competent" as "having requisite or adequate ability or qualities."' All professions require competence to be successful-from chefs, to tailors, to NFL quarterbacks. Without...
View Article"Connected" Discovery: What the Ubiquity of Digital Evidence Means for...
More than ten years ago, the Zubulake case raised awareness of the importance of digital evidence in litigation. At that time, for many lawyers, the discovery process consisted of collecting paper...
View ArticleA Litigator's Guide to the Internet of Things
Maybe you've heard about the Internet of Things (loT). It's the network of physical objects (or "things") that connect to the Internet and each other and have the ability to collect and exchange data....
View ArticleDigital Direction for the Analog Attorney-Date Protection, E-Discovery, and...
Over the past twenty years, the near-constant use of sophisticated technological tools has become an essential and indispensable aspect of the practice of law. The time and cost efficiencies generated...
View ArticleA New Class of Worker for the Sharing Economy
Jennifer Guidry begins her workday at four a.m. She begins by vacuuming her personal car, preparing it to "ferry around strangers" for Uber, Lyft, and Sidecar. Uber, Lyft, and Sidecar are "ride...
View ArticleCo-Developing Drugs with Indigenous Communities: Lessons from Peruvian Law...
This paper will examine the issues surrounding the codevelopment of drugs derived from traditional medicines used by indigenous peoples in Amazonia, with a focus on Peru. In particular, this paper...
View ArticleThe Skeleton of a Data Breach: The Ethical and Legal Concerns
After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of 2012 as “The Summer of the Data Breach.” Four years later, businesses across...
View Article