Informational Inequality: How High Frequency Traders Use Premier Access to Information to Prey on Institutional Investors

By: Jacob Adrian In recent months, Wall Street has been whipped into a frenzy following the March 31st release of Michael Lewis’ book “Flash Boys.” In the book, Lewis characterizes the stock market as being rigged, which has institutional investors and outside observers alike demanding some sort of SEC action. The vast majority of this criticism is aimed at high-frequency traders, who use complex computer algorithms to execute trades several times faster than the blink of an eye. One of the many complaints against high-frequency traders is over parasitic trading practices, such as front-running. Front-running, in the era of high-frequency trading, is best defined as using the knowledge of a large impending trade to take a favorable position in the market before that trade is executed. Put simply, these traders are able to jump in front of a trade before it can be completed. This Note explains how high-frequency traders are able to front-run trades using superior access to information, and examines several proposed SEC responses. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 256

Legal Nature of Emails: A Comparative Perspective

By: Edina Harbinja There is currently a conflict between laws and the market in their treatment of email. Laws mandate that emails are not protected as property unless copyrightable or protected by another legal mechanism. But the market suggests that emails are user-owned property without further qualification. Moreover, the nature of email is treated slightly differently between the U.S. and U.K. legal regimes. While the current legal regimes applicable to email in the U.K. and U.S. are reasonable, legal harmonization within these systems, and with the service provider market, should be achieved. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 227

Weathering the Nest: Privacy Implications of Home Monitoring for the Aging American Population

By: Jillisa Bronfman The research in this paper will seek to ascertain the extent of personal data entry and collection required to enjoy at least the minimal promised benefits of distributed intelligence and monitoring in the home. Particular attention will be given to the abilities and sensitivities of the population most likely to need these devices, notably the elderly and disabled. The paper will then evaluate whether existing legal limitations on the collection, maintenance, and use of such data are applicable to devices currently in use in the home environment and whether such regulations effectively protect privacy. Finally, given appropriate policy parameters, the paper will offer proposals to effectuate reasonable and practical privacy-protective solutions for developers and consumers. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 192

The Red Dawn of Geoengineering: First Step Toward an Effective Governance for Stratospheric Injections

By: Edward J. Larson A landmark report by the National Academy of Sciences (NAS) issued in 2015 is the latest in a series of scientific studies to assess the feasibility of geoengineering with stratospheric aerosols to offset anthropogenic global warming and to conclude that they offer a possibly viable supplement or back-up alternative to reducing carbon dioxide emissions. The known past effect of major explosive volcanic eruptions temporarily moderating average worldwide temperatures provides evidence in support of this once taboo form of climate intervention. In the most extensive study to date, an elite NAS committee now suggests that such processes for adjusting global temperature, while still uncertain, merit further research and field testing. Every study stresses the need for transparent international governance of stratospheric injections, especially given that the benefits of such interventions are certain to be unevenly distributed and the risks are not fully known. After examining the roadblocks to such governance, this paper explores the statutory and common law frameworks that could provide some stop-gap approaches until the needed regulatory regime emerges. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 157

Aereo and Internet Television: A Call to Save the Ducks (A La Carte)

By: Pooja Patel If it looks like a duck, swims like a duck, and quacks like a duck, it is probably a duck. The most recent U.S. Supreme Court decision regarding the Copyright Act employed this “duck test” when determining that Aereo, an Internet content-streaming company, violated the Copyright Act by infringing on the copyrights of television broadcast networks. The Supreme Court ruled that Aereo’s Internet streaming services resembled cable television transmissions too closely. Therefore, by streaming copyrighted programming to its subscribers without the cable compulsory license, Aereo violated the Transmit Clause of the 1976 Copyright Act. Subsequently, Aereo used this Supreme Court decision to obtain a compulsory license from the Copyright Office but was denied. Forced back into litigation, Aereo filed for Chapter 11 Bankruptcy This Issue Brief describes Aereo’s technology, the litigation that followed, and the related precedent, and concludes that the district court should have granted Aereo a Section 111 Statutory License in line with the Supreme Court’s “duck test.” It considers the implications of the Court’s preliminary injunction against Aereo’s “a la carte” TV technology, what this means for the future of similar technological innovation, and the effects on consumers and competition. Download Full Article (PDF)

Riley v. California and the Stickiness Principle

By: Steven I. Friedland In Fourth Amendment decisions, different concepts, facts and assumptions about reality are often tethered together by vocabulary and fact, creating a ‘Stickiness Principle.’ In particular, form and function historically were considered indistinguishable, not as separate factors. For example, “containers” carried things, “watches” told time, and “phones” were used to make voice calls. Advancing technology, though, began to fracture this identity and the broader Stickiness Principle. In June 2014, Riley v. California and its companion case, United States v. Wurie, offered the Supreme Court an opportunity to begin untethering form and function and dismantling the Stickiness Principle. Riley presented the question of whether cell phone searches incident to a lawful arrest were constitutional. The Court, which had clung to pre-digital concepts such as physical trespass well into the twenty-first century, appeared ready to explore how technology is reshaping historically understood conceptions of privacy. From a broader perspective, the case offers an initial step in reconciling pre-digital rules based on outdated spatial conceptions of physical things with the changing realities of a technology driven world. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 121

Frand v. Compulsory Licensing: The Lesser of the Two Evils

By: Srividhya Ragavan, Brendan Murphy, and Raj Davé This paper focuses on two types of licenses that can best be described as outliers—FRAND and compulsory licenses. Overall, these two specific forms of licenses share the objective of producing a fair and reasonable license of a technology protected by intellectual property. The comparable objective notwithstanding, each type of license achieves this end using different mechanisms. The FRAND license emphasizes providing the licensee with reasonable terms, e.g., by preventing a standard patent holder from extracting unreasonably high royalty rates. By contrast, compulsory licenses emphasize the public benefit that flows from enabling access to an otherwise inaccessible invention. Ultimately, both forms of license attempt to create a value for the licensed product that can be remarkably different from the product’s true market value. Nevertheless, both forms ultimately benefit the end-consumer who pays less to access a product subject to either of these forms of license. In comparing these two forms of licenses, the paper hopes to determine whether one form is better than the other, and if so, from whose perspective—the consumer, the licensor or the licensee. In doing so, this paper compares the different prevailing efforts to embrace such licenses as well

Noriega v. Activision/Blizzard: The First Amendment Right to Use a Historical Figure’s Likeness in Video Games

By: Joshua Sinclair Panama’s former dictator, Manuel Noriega, recently sued Activision Blizzard in the California Superior Court for using his likeness and image in the popular video game “Call of Duty: Black Ops II.” In his complaint, Noriega alleged that the use of his likeness violated his right of publicity. Former New York Mayor, Rudy Giuliani, came to Activision’s defense, and filed a motion to dismiss, which was granted. In granting Activision’s motion, the court held that Activision’s use of Noriega’s likeness was transformative and did not violate his right of publicity. This Issue Brief argues that the California Superior Court should not have applied the transformative use test but should have held that Manuel Noriega did not have a right of publicity for his place in Panama’s history. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 69

The Evolution of Giving: Considerations for Regulation of Cryptocurrency Donation Deductions

By: Ashley Pittman This Issue Brief looks at the rapidly growing area of cryptocurrency donations to nonprofit organizations. Given the recent IRS guidance issued on taxation of Bitcoin, specifically its decision to treat cryptocurrencies as property, questions now arise as to how charitable contributions of the coins will be valued for tax deductions. Though Bitcoin resembles most other capital gain property, its volatility, general decline in value, anonymity, and potential for abuse require specific guidance on valuation and substantiation so as to handle its unique nature and prevent larger deductions for charitable contributions than those to which taxpayers are entitled. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 48

Authenticity and Admissibility of Social Media Website Printouts

By: Wendy Angus-Anderson Social media posts and photographs are increasingly denied admission as evidence in criminal trials. Courts often cite issues with authentication when refusing to admit social media evidence. Cases and academic writings separate recent case law into two approaches: The Maryland Approach and the Texas Approach. The first method is often seen as overly skeptical of social media evidence, setting the bar too high for admissibility. The second approach is viewed as more lenient, declaring that any reasonable evidence should be admitted in order for a jury to weigh its sufficiency. This Brief addresses the supposed differences between the two sets of cases and suggests that courts are not actually employing two distinct approaches. The Maryland Approach courts are not holding social media content to a higher standard than the Texas Approach courts, but are merely responding to a lack of evidence connecting the proffered content to the purported author. Download Full Article (PDF) Cite: 14 Duke L. & Tech. Rev. 33