Volume 16

The Three Faces of Prometheus: A Post-Alice Jurisprudence of Abstractions

Volume 16, Issue 4 (Jul 2015)

While Alice v. CLS Bank has confirmed that patent claims require a further “inventive concept” beyond an underlying abstract idea or law of nature for patent-eligibility, there is little agreement on what defines either an “abstract idea” or an “inventive concept.” Resolving this uncertainty is critical to determining the patent-eligibility of software claims beyond the

Download Full Text PDF

Jeffey A. Lefstin, The Three Faces of Prometheus: A Post-Alice Jurisprudence of Abstractions, 16 N.C.J.L. & Tech. 647 (2015), available at http://ncjolt.org/wp-content/uploads/2015/07/Lefstin_Final.pdf.

Ghost in the “New Machine”: How Alice Exposed Software Patenting’s Category Mistake

Volume 16, Issue 4 (Jul 2015)

The Alice Court’s characterization of computer programming has effectively repudiated, inter alia, the doctrine that programming a general-purpose computer creates a patent-eligible “new machine.” This Article revisits In re Bernhart, the first holding based on the “new machine” principle, concluding that the Court of Customs and Patent Appeals committed a category mistake in conducting its

Download Full Text PDF

Andrew Chin, Ghost in the "New Machine": How Alice Exposed Software Patenting's Category Mistake, 16 N.C.J.L. & Tech. 623 (2015), available at http://ncjolt.org/wp-content/uploads/2015/07/Chin_Final.pdf.

Hotel, Motel, Holiday Inn and Peer-to-Peer Rentals: The Sharing Economy, North Carolina, and the Constitution

Volume 16, Online Edition (Apr 2015)

Within the past several years, a new business model has rapidly expanded into a billion dollar industry, with potential to expand further—the sharing economy. The North Carolina General Assembly has yet to address how it intends to regulate the sharing economy. The General Assembly could choose to create completely new regulations for the sharing economy,

Download Full Text PDF

Joseph Shuford, Hotel, Motel, Holiday Inn and Peer-to-Peer Rentals: The Sharing Economy, North Carolina, and the Constitution, 16 N.C. J.L. & Tech. On. (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Shuford_Final.pdf.

Batteries and State Law: A Glimpse of the Future in the Lone Star State

Volume 16, Online Edition (Apr 2015)

The mismatch of localized electricity regulations with interstate electricity generation and transmission creates large inefficiencies. It is possible to solve this problem without overturning the entire existing regime by affording federal, state, and local regulatory bodies more power to implement battery technology without traditional regulatory hindrances. Given the limited number of regulatory bodies responsible for

Download Full Text PDF

Rich Pepper, Batteries and State Law: A Glimpse of the Future in the Lone Star State, 16 N.C. J.L. & Tech. On. 269 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Pepper_Final.pdf.

When Five Hours Equals Five Days: Bringing Section 504 Education Plans Into the 21st Century

Volume 16, Online Edition (Apr 2015)

According to federal regulations, all students have a right to a free appropriate public education in the most integrated, least restrictive environment appropriate. Discrimination based upon disabilities is a violation of civil rights. An estimated 10.2 million children in the United States have special healthcare needs, accounting for 13.9% of all children. Some students who

Download Full Text PDF

Cameron Neal, When Five Hours Equals Five Days: Bringing Section 504 Education Plans Into the 21st Century, 16 N.C. J.L. & Tech. On. 235 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Neal_Final-1.pdf.

Instasearch: Fixing Fourth Amendment Jurisprudence as Applied to Instagram and Other Cyberspace Data Storage Providers

Volume 16, Online Edition (Apr 2015)

Under the Supreme Court’s Fourth Amendment jurisprudence, the constitutional privacy protections that many Americans take for granted are non-existent in cyberspace because of the third-party doctrine, which was born decades before the popular adoption of cyberspace social networks and data storage services. When someone in America posts a picture on Instagram or updates a status

Download Full Text PDF

Adam Maas, Instasearch: Fixing Fourth Amendment Jurisprudence as Applied to Instagram and Other Cyber Storage Providers, 16 N.C. J.L. & Tech. On. 202 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Maas_Final.pdf.

Railing Against Cyber Imperialism: Discussing the Issues Surrounding the Pending Appeal of United States v. Microsoft Corp.

Volume 16, Online Edition (Apr 2015)

The United States government was granted a wide berth of surveillance powers post 9/11. At a time when Americans felt vulnerable to foreign attack, the executive branch passed the USA PATRIOT Act that balanced a reduction of privacy rights with a promise of increased national security. Twelve years later, Edward Snowden released documents showing exactly

Download Full Text PDF

Jason Green, Railing Against Cyber Imperialism: Discussing the Issues Surrounding the Pending Appeal of United States v. Microsoft Corp. 16 N.C. J.L. & Tech. On. 172 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Green_Final.pdf.

How the Rise of Big Data and Predictive Analytics are Changing the Attorney’s Duty of Competence

Volume 16, Issue 3 (Apr 2015)

If the legal profession had been able to foresee in the late 1990s and early 2000s, prior to the meteoric rise and ensuing cultural ubiquity of social media, that every tagged spring break photo, 2:00 a.m. status update, and furious wall post would one day be vulnerable to potential exposure in the cold, unforgiving light

Download Full Text PDF

Peter Segrist, How the Rise of Big Data and Predictive Analytics are Changing the Attorney's Duty of Competence, 16 N.C. J.L. & Tech. 527 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Segrist_Final.pdf.

Googlestroika: Five Years Later

Volume 16, Issue 3 (Apr 2015)

This article re-examines and revises observations made in the author’s 2009 article, Googlestroika: Privatizing Privacy. 1 Specifically, it looks to the contractual obligations and practical considerations that define how users interact not only with Google, but also with social network websites and other online service providers. Consideration is given to how an individual leaves a

Download Full Text PDF

Karl T. Muth, Googlestroika: Five Years Later, 16 N.C. J.L & Tech. 487 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Muth_Final.pdf.

Towards a Cybersecurity Policy Model: Israel National Cyber Bureau Case Study

Volume 16, Issue 3 (Apr 2015)

Designing and implementing a cybersecurity legal policy is an ambitious endeavor. This Article offers primary guidelines focusing on the national level, and uses Israel’s newly created National Cyber Bureau as a case in point. Additionally, this Article offers a cross-section comparison between the national cybersecurity policies of the United States, the United Kingdom, Canada, Japan,

Download Full Text PDF

Daniel Benoliel, Towards a Cybersecurity Policy Model: Israel National Cyber Bureau Case Study, 16 N.C. J.L. & Tech. 435 (2015), available at http://ncjolt.org/wp-content/uploads/2015/04/Benoliel_Final.pdf.

The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at eic.ncjolt@gmail.com with permissions inquiries.