Articles

Jun
16

Currently the most widely-used file-sharing technology, the BitTorrent protocol, enables its users to transmit and receive much larger digital files with even greater ease than its popular predecessors such as the centralized and decentralized peer-topeer networks of Napster, Kazaa, and Grokster. It did not take long before BitTorrent Web sites hosted in the United States

Jun
16

Adolescent brain imaging technology is an evolving area of science that reveals levels of maturity in the adolescent brain. Its potential effect on criminally culpable behavior is the source of extensive debate. The technology can inform judges and jurors on essential differences between how adults make decisions regarding their conduct as distinct from adolescents. United

Jun
09

Financial services firms have traditionally been cautious about utilizing emerging communication tools such as social media due to uncertainty regarding the application of existing securities laws to the use of these tools. Recently, regulators have focused their attention on defining the regulations that govern social media. FINRA has taken an active approach to informing financial

Jun
09

The hydraulic fracturing and horizontal drilling technologies utilized in the extraction of natural gas have proven controversial, particularly in states where the legal infrastructure is unprepared to accommodate the industry. In particular, a newly discovered natural gas reservoir in central North Carolina highlights deficiencies in the state’s laws addressing the serious environmental and public health

Jun
09

In response to the increasing number of cyberattacks, the U.S. Securities and Exchange Commission’s Division of Corporation Finance recently issued guidance on the disclosure obligations of companies relating to cybersecurity risks and cyber incidents. While the purpose behind the action was well founded, this article argues that the guidelines are inadequate because they fail to

Jun
09

Stalking is a crime that affects millions of people each year, with profound mental, physical, and financial effects for victims. In a technological world, new forms of stalking arose through online interactive mediums such as Twitter, blogs, Facebook, and email. Cyberstalking has many of the same ramifications as traditional stalking but with some new twists.

Categories