Archives

  • Initial Coin Offerings: Innovation, Democratization, and the SEC
    By: Jay Preston Initial coin offerings are a source of controversy in the world of startup fundraising, and their legality is, at best, an open question. Amid soaring valuations and rumors of looming SEC action, investors and issuers alike are scrambling to forge a path forward for the token-based startups of tomorrow. While issuers may soon ...
  • Crashed Software: Assessing Product Liability for Software Defects in Automated Vehicles
    By: Sunghyo Kim Automated vehicles will not only redefine the role of drivers, but also present new challenges in assessing product liability. In light of the increased risks of software defects in automated vehicles, this Note will review the current legal and regulatory framework related to product liability and assess the challenges in addressing on-board software ...
  • These Walls Can Talk! Securing Digital Privacy in the Smart Home Under the Fourth Amendment
    By: Stefan Ducich Privacy law in the United States has not kept pace with the realities of technological development, nor the growing reliance on the Internet of Things (IoT). As of now, the law has not adequately secured the “smart” home from intrusion by the state, and the Supreme Court further eroded digital privacy by conflating ...
  • Regulating Data as Property: A New Construct for Moving Forward
    By: Jeffrey Ritter and Anna Mayer The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public ...
  • Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses
    By: Sara Sun Beale and Peter Berris The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, ...