Volume 18

The Importance of The Design Patent to Modern Day Technology: The Supreme Court’s Decision to Narrow The Damages Clause in Samsung v. Apple

Volume 18, Online Edition (Apr 2017)

With the rapid growth of technological innovations in today’s society, manufacturers are in constant competition with one another to produce the best looking and most distinct products on the consumer market. To prevent an inventor’s new and unique design from replication, Congress established the design patent to protect the appearance of any new, original, and

Download Full Text PDF

Sarah Burnick, The Importance of The Design Patent to Modern Day Technology: The Supreme Court’s Decision to Narrow The Damages Clause in Samsung v. Apple, 18 N.C.J.L. & Tech. On. 283 (2017), http://ncjolt.org/wp-content/uploads/2017/04/Burnick_Final2-copy.pdf.

The Security and Privacy In Your Car Act: Will It Actually Protect You?

Volume 18, Online Edition (Apr 2017)

On July 21, 2015, in light of emerging technology involving autonomous driving vehicles, the United States Senate proposed Senate Bill 1806, or the Security and Privacy in Your Car Act, to address issues surrounding these technologies. The “SPY Car Act” attempts to address issues surrounding cybersecurity, data privacy, and hacking of autonomous driving vehicles. The

Download Full Text PDF

Benjamin L. Bollinger, The Security and Privacy In Your Car Act: Will It Actually Protect You?, 18 N.C.J.L. & Tech. On. 214 (2017), http://ncjolt.org/wp-content/uploads/2017/04/Bollinger_Final-copy.pdf.

Bitcoin: Breaking Bad or Breaking Barriers?

Volume 18, Online Issue (Apr 2017)

For nearly the past decade, Bitcoin has found itself in a state of non-regulation, ambiguous regulation, and conflicting regulation, with several interested agencies vying for effective regulation of an often misunderstood technology. Early run-ins with large-scale criminal enterprises in large part created the multi-directional regulatory attention Bitcoin “enjoys” today. Even while many businesses and individuals

Download Full Text PDF

Christopher Burks, Bitcoin: Breaking Bad or Breaking Barriers?, 18 N.C.J.L. & Tech. On. 244 (2017), http://ncjolt.org/wp-content/uploads/2017/04/Burks_Final-copy.pdf.

One Small Step: the Impact of the U.S. Commercial Space Launch Competitiveness Act of 2015 on the Exploration of Resources in Outer Space

Volume 18, Issue 2 (Dec 2016)

The United States Congress recently passed the U.S. Commercial Space Launch Competitiveness Act (“CSLCA”). Title IV of the Act ultimately recognized commercial property rights in resources extracted from extraterrestrial bodies. Consequently, the passage of such legislation has once again brought property rights in outer space to the forefront of legal discussion. Although some have said

Download Full Text PDF

P.J. Blount & Christian J. Robison, One Small Step: the Impact of the U.S. Commercial Space Launch Competitiveness Act of 2015 on the Exploration of Resources in Outer Space, 18 N.C.J.L. & Tech. 160 (2016), http://ncjolt.org/wp-content/uploads/2017/01/BlountRobison_Final.pdf.

University Classroom Presentations As Prior Art Disclosures: Are Engineering Capstone Teams Unknowingly Giving Away The Fruits Of Their Labor?

Volume 18, Issue 2 (Dec 2016)

Today’s universities and colleges offer a multitude of programs focused on innovation, product development, and entrepreneurship. Students and faculty members are encouraged to create products that can be commercialized. 2 Universities nurture innovation and entrepreneurship in order to foster economic growth and create jobs in their communities and regions. They see entrepreneurship as a new

Download Full Text PDF

Patricia E. Campbell, University Classroom Presentations As Prior Art Disclosures: Are Engineering Capstone Teams Unknowingly Giving Away The Fruits Of Their Labor?, 18 N.C.J.L. & Tech. 187 (2016), http://ncjolt.org/wp-content/uploads/2016/12/Campbell_Final.pdf.

Is Cyberattack the Next Pearl Harbor?

Volume 18, Issue 2 (Dec 2016)

Central Intelligence Agency Director, Leon Panetta, states in his Secretary of Defense confirmation testimony before the Senate Armed Services Committee that, “he next Pearl Harbor that we confront could very well be a cyberattack that cripples America’s electrical grid and its security and financial systems.” Cyberattacks have become a daily threat to businesses, consumers, and all

Download Full Text PDF

Lawrence J. Trautman, Is Cyberattack the Next Pearl Harbor?, 18 N.C.J.L. & Tech. 233 (2016), http://ncjolt.org/wp-content/uploads/2016/12/Trautman_Final.pdf.

Oracle v. Google: Setting a Standard or Handicapping an Industry?

Volume 18, Online Edition (Dec 2016)

For years the world of software programming has been operating under the assumption that both the declaration code and the structure, sequence, and organization (SSO) of Java application program interfaces (APIs) were not copyrightable and were therefore free for all to use. However, when Oracle sued Google in 2014 for Google’s use of Java APIs

Download Full Text PDF

Tyler J. Demasky, Oracle v. Google: Setting a Standard or Handicapping an Industry?, 18 N.C.J.L. & Tech. On. 1 (2016), http://ncjolt.org/wp-content/uploads/2016/12/Demasky_Final.pdf.

Is This Going to Be on the Test? Reconciling the Four-Way Circuit Split over Handling Nominative Fair Use

Volume 18, Online Edition (Dec 2016)

Nominative fair use quietly allows the media to name sports teams, musical groups, and other trademarked sources in their reports, for the most part, without liability for infringement. Consumers rely on nominative fair use to make efficient purchasing decisions. It allows consumers to research and find third-party reviews directly naming and comparing brands. Without nominative

Download Full Text PDF

Christian Ferlan, Is This Going to Be on the Test? Reconciling the Four-Way Circuit Split over Handling Nominative Fair Use, 18 N.C.J.L. & Tech. On. 33 (2016), http://ncjolt.org/wp-content/uploads/2016/12/Ferlan_Final-.pdf.

Algorithmic Injustice: How the Wisconsin Supreme Court Failed to Protect Due Process Rights in State v. Loomis

Volume 18, Online Edition (Dec 2016)

Risk assessment algorithms are equations designed to take large amounts of information about an offender’s past criminal experience, as well as other biographical and psychological information, and use it to compute a score that ranks an offender at various risk levels. Depending on which body within the system is utilizing it, the score is then

Download Full Text PDF

Katherine Freeman, Algorithmic Injustice: How the Wisconsin Supreme Court Failed to Protect Due Process Rights in State v. Loomis, 18 N.C.J.L. & Tech. On. 75 (2016), http://ncjolt.org/wp-content/uploads/2016/12/Freeman_Final.pdf.

Cashing Out: How Big Pharma Continues to Capitalize on the Antitrust Loophole Created in FTC v. Actavis

Volume 18, Online Edition (Dec 2016)

The drug industry is one of the most lucrative in the United States. Drug manufacturers routinely find themselves thrust into patent infringement litigation against generic manufacturers who are motivated by high potential returns from the marketplace. In lieu of expensive and time-consuming litigation, brand and generic manufacturers will often enter into settlement agreements; however, these

Download Full Text PDF

Laura A. Gregory, Cashing Out: How Big Pharma Continues to Capitalize on the Antitrust Loophole Created in FTC v. Actavis, 18 N.C.J.L. & Tech. On. 107 (2016), http://ncjolt.org/wp-content/uploads/2016/12/Gregory_Final-.pdf.

The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at eic.ncjolt@gmail.com with permissions inquiries.