Michigan IT Lawyer a Publication of the State Bar of Michigan Information Technology Law Section

Total Page:16

File Type:pdf, Size:1020Kb

Michigan IT Lawyer a Publication of the State Bar of Michigan Information Technology Law Section State Bar of Michigan Michigan IT Lawyer A Publication of the State Bar of Michigan Information Technology Law Section http://www.michbar.org/computer Table of Contents Bits and Bytes from the Chair November 2009 . Vol. 26, Issue 6 By Jeremy D. Bisdorf, Jaffe Raitt Heuer & Weiss PC . Second Annual Information Technology Law Seminar ...............................................................2 . Recent Developments in Information The end of 2009 is quickly approaching. As Fall in Michigan enters its last Technology Law ..................................................3 stages, our days become more frequently filled with cloud cover and we see very little daylight as we frequently head to and from our weekly activities in . Meet a Section Member ......................................8 the dark. Where does the time go? . Quanta Computer, Inc. v. LG Electronics, For the Information Technology Law Section, at least some of that time has Inc.: The Supreme Court Revisits The Patent been spent on Section activities and early planning efforts for the next year. Exhaustion Doctrine. Is It Time To Re-Think Mary Ann Wehr recently attended a State Bar Section Fair in Grand Rapids Your Sales And Licensing Strategies? ................9 for Cooley Law School students on behalf of our Section. We completed our . Court Rules Red Flags Rule Does Not Apply ICLE Seminar Event in Plymouth, Michigan and received high marks from the to Lawyers .........................................................26 attendees. We have planned this year’s goals during our first Section Council Meeting. Publicly Available Websites for IT Lawyers ....27 During the next few months we will all be watching the Supreme Court to see how it will handle the Bilski case and any changes that may result to soft- ware related patents. Further, our Section is evaluating whether or not it should take a position for or against recent suggested amendments to the Michigan Uniform Electronic Transactions Act. Please keep an eye on this newsletter and our Section’s website for updates on these important matters. Our spring networking event may be subject to some changes as a result of Michigan IT Lawyer is published every other month. our efforts to promote our Section’s dual missions of recruiting more members Previously published issues of the Michigan IT Lawyer, and its predecessor the Michigan Computer Lawyer, to the Section and to better facilitate the networking opportunities among the are available at http://www.michbar.org/computer/ existing members. While prior networking events have certainly been success- newsletters.cfm. If you have an article you would like ful, it is always important to keep things “fresh” and appealing to the member- considered for publication, send a copy to: ship. I am looking forward to hearing the suggestions of the committee as to Brian A. Hall any changes to the event that they may recommend. We will pass that informa- Traverse Legal, PLC tion along as soon as the Council makes some decisions. 810 Cottageview Drive Suite G-20 Looking forward to seeing you soon. Have a wonderful holiday season. Traverse City, Michigan 49684 e-mail: [email protected] Jeremy D. Bisdorf Chairperson, Information Technology Law Section [email protected] Michigan IT Lawyer Second Annual Information Technology 2009-2010 Law Seminar Information Technology Section Council Chairperson . Jeremy D. Bisdorf Chairperson-elect . Mark G. Malven By John Di Giacomo, Traverse Legal, PLC Secretary . Charles A. Bieneman Treasurer . Karl A. Hochkammer The 2nd Annual Information Technology Law Seminar was held on Thursday, COUN C IL ME M BERS October 29, 2009 at the Inn at St. John’s in Plymouth, and physical and virtual Charles A. Bieneman attendees were greeted with an interesting set of speakers on a variety of areas Jeremy D. Bisdorf William Cosnowski, Jr. that fit this year’s topic of ‘Core Legal Issues in a High Tech Business World’. The Donald M. Crawford moderator for the seminar was Charles A. Bieneman. After a brief welcome, Jeanne M. Dunk attendees used hand-held fobs to vote on various topics concerning the Informa- Samuel Frederick Brian A. Hall tion Technology Section of the State Bar, including the location of future meetings Karl A. Hochkammer (Metro Detroit won overwhelmingly). Three presenters spoke in each of two Matthew M. Jakubowski sessions, and each session allotted time for attendees to ask the speakers further William J. Lamping, Jr. questions. Mark G. Malven Ronald S. Nixon To open the first session, Robert S. Gurwin, counsel for America Online, Carla M. Perrota gave an interesting presentation on “The Legal Landscape of Web 2.0.” Robert Vincent I. Polley Claudia Rast gave an introductory definition of Web 2.0 and proceeded to discuss the legal David R. Syrowik issues facing business models that utilize Web 2.0 services, including copyright John L. Tatum infringement, Communications Decency Act § 230 issues, defamation issues, Mary Ann Wehr electronic communications policies in employment contracts, and product dispar- Immediate Past Chair agement. Robert commented on the recent Lori Drew MySpace case, as well as Christopher J. Falkowski other principal cases implicating Web 2.0 issues. Ex-Officio Beth A. Mier, senior counsel at CSC Covansys Corp. gave the second Claudia V. Babiarz Thomas Costello, Jr. presentation of the first session. Beth spoke on the allocation of risk in technical Kathy H. Damian service agreements, and segmented these risks into financial, operational, and Christopher J. Falkowski legal risks. Beth discussed practical considerations for negotiating the key terms Robert A. Feldman Sandra Jo Franklin of the service agreements, including having the appropriate experts available, Mitchell A. Goodkin managing the negotiating team, and keeping long-term goals in mind. Beth also William H. Horton provided an overview of important clauses, such as limitations of liability, indem- Lawrence R. Jordan Charles P. Kaltenbach nifications, and savings clauses. Michael S. Khoury Next, Robert L. Rothman, president of Privacy Associates International dis- J. Michael Kinney Edward F. Langs* cussed privacy issues involved in cross-border data transfers. He discussed the Thomas L. Lockhart philosophical differences between the US and European Union views of data Janet L. Neary privacy, and how the EU considers privacy a fundamental human right. Rob- Kimberly A. Paulson Paul J. Raine ert discussed the implications of moving data across national borders, using a Jeffrey G. Raphelson hypothetical involving a corporate employee list, and discussed issues relating to Frederick E. Schuchman III contracting with foreign information technology suppliers. Steven L. Schwartz Carol R. Shepard The first speaker of the second session was Charles R. (Rod) Marvin Jr., the Anthony A. Targan managing member at Dykema’s Washington D.C. office. Rod spoke on how to Stephen L. Tupper avoid problems when contracting with the government, including actual and Commissioner Liaison apparent authority issues when licensing software to the federal government, James N. Erhart termination on convenience clauses in government contracts, and choice of law Newsletter Co-Editors clauses and their relation to jurisdiction in the Federal Court of Claims. Brian A. Hall Michael Gallo William T. Casey, an attorney for Hewlett Packard Enterprise Services, *denotes deceased member spoke on the benefits and risks of open source software. William discussed 2 . Vol. 26, Issue 6 . November 2009 Michigan IT Lawyer Second Annual . Recent Developments in Continued from page 2 the definition of open source Information Technology Law software and the most popular open source licenses, includ- By David R. Syrowik, Brooks Kushman PC ing the GNU public license and the BSD license. William also discussed the differences Patents – Case Law – U.S. Supreme Court between open source software, As reported at 78 BNA’s PTCJ 675, on September 25, 2009, the government commercial software, free soft- filed a long-awaited brief in arguing that patent-eligible processes under 35 U.S.C. ware, and shareware, and he § 101 encompass “the broad expanse of technological and industrial fields”, but discussed the legal risks of using not “methods of organizing human activity”. Bilski v. Kappos open source software. Finally, Professor Roberta Patents – Case Law – U.S. Courts of Appeal J. Morris from Stanford Law As reported at 78 BNA’s PTCJ 405 on July 27, 2009, the U.S. Court of Ap- School spoke on the recent Bilski peals for the Federal Circuit invalidated Blackboard Inc.’s patent for conducting v. PTO Commissioner case and courses online over the Internet, as all patent claims are determined to be either the US Supreme Court’s grant of anticipated or inadequately disclosed. Blackboard Inc. v. Desire2Learn Inc. certiorari in that case. Roberta As reported at 78 BNA’s PTCJ 502 on August 19, 2009, the U.S. Court of discussed the history of disfa- Appeals for the Federal Circuit held en banc that a statutory prohibition against vored inventions and the modern supplying components of a patented invention for offshore assembly does not disfavored inventions: software apply to method claims. In an 11-1 opinion, the court overrules its 2005 holding and business methods. Roberta in Union Carbide v. Shell Oil, which appellants argued was in conflict with the also provided attendees with her . U.S. Supreme Court’s 2007 decision in Microsoft Corp. v. AT&T Corp. Cardiac . predictions and practice tips in . Pacemakers
Recommended publications
  • Law Enforcement Technology Roadmap: Lessons to Date from the Northwest Technology Desk and the Northwest FADE Pilots
    PNNL-20314 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Law Enforcement Technology Roadmap: Lessons to Date from the Northwest Technology desk and the Northwest FADE Pilots CL West SJ Kreyling April 2011 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor Battelle Memorial Institute, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof, or Battelle Memorial Institute. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof. PACIFIC NORTHWEST NATIONAL LABORATORY operated by BATTELLE for the UNITED STATES DEPARTMENT OF ENERGY under Contract DE-AC05-76RL01830 Printed in the United States of America Available to DOE and DOE contractors from the Office Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831-0062; ph: (865) 576-8401 fax: (865) 576-5728 email: [email protected] Available to the public from the National Technical Information Service 5301 Shawnee Rd., Alexandra, VA 22312 ph: (800) 553-NTIS (6847) email: [email protected] <http://www.ntis.gov/about/from.aspx> Online ordering: http://www.ntis.gov PNNL-20314 Law Enforcement Technology Roadmap: Lessons to Date from the Northwest Technology desk and the Northwest FADE CL West SJ Kreyling April 2011 Prepared for The U.S.
    [Show full text]
  • Itu Toolkit for Cybercrime Legislation
    International Telecommunication Union Cybercrime Legislation Resources ITU TOOLKIT FOR CYBERCRIME LEGISLATION Developed through the American Bar Association’s Privacy & Computer Crime Committee Section of Science & Technology Law With Global Participation ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector Draft Rev. February 2010 For further information, please contact the ITU-D ICT Applications and Cybersecurity Division at [email protected] Acknowledgements We are pleased to share with you a revised version of the ITU Toolkit for Cybercrime Legislation. This version reflects the feedback received since the launch of the Toolkit in May 2009. If you still have input and feedback on the Toolkit, please do not hesitate to share this with us in the BDT’s ICT Applications and Cybersecurity Division at: [email protected]. (The deadline for input on this version of the document is 31 July 2010.) This report was commissioned by the ITU Development Sector’s ICT Applications and Cybersecurity Division. The ITU Toolkit for Cybercrime Legislation was developed by the American Bar Association’s Privacy & Computer Crime Committee, with Jody R. Westby as the Project Chair & Editor. All rights reserved. No part of this publication may be reproduced in any form or by any means without written permission from the ITU and the American Bar Association. Denominations and classifications employed in this publication do not imply any opinion concerning the legal or other status of any territory or any endorsement or acceptance of any boundary. Where the designation "country" appears in this publication, it covers countries and territories. The ITU Toolkit for Cybercrime Legislation is available online at: www.itu.int/ITU-D/cyb/cybersecurity/legislation.html This document has been issued without formal editing.
    [Show full text]
  • Pattern Criminal Jury Instructions for the District Courts of the First Circuit)
    UNITED STATES DISTRICT COURT DISTRICT OF MAINE 2019 REVISIONS TO PATTERN CRIMINAL JURY INSTRUCTIONS FOR THE DISTRICT COURTS OF THE FIRST CIRCUIT DISTRICT OF MAINE INTERNET SITE EDITION Updated 6/24/19 by Chief District Judge Nancy Torresen PATTERN CRIMINAL JURY INSTRUCTIONS FOR THE FIRST CIRCUIT Preface to 1998 Edition Citations to Other Pattern Instructions How to Use the Pattern Instructions Part 1—Preliminary Instructions 1.01 Duties of the Jury 1.02 Nature of Indictment; Presumption of Innocence 1.03 Previous Trial 1.04 Preliminary Statement of Elements of Crime 1.05 Evidence; Objections; Rulings; Bench Conferences 1.06 Credibility of Witnesses 1.07 Conduct of the Jury 1.08 Notetaking 1.09 Outline of the Trial Part 2—Instructions Concerning Certain Matters of Evidence 2.01 Stipulations 2.02 Judicial Notice 2.03 Impeachment by Prior Inconsistent Statement 2.04 Impeachment of Witness Testimony by Prior Conviction 2.05 Impeachment of Defendant's Testimony by Prior Conviction 2.06 Evidence of Defendant's Prior Similar Acts 2.07 Weighing the Testimony of an Expert Witness 2.08 Caution as to Cooperating Witness/Accomplice/Paid Informant 2.09 Use of Tapes and Transcripts 2.10 Flight After Accusation/Consciousness of Guilt 2.11 Statements by Defendant 2.12 Missing Witness 2.13 Spoliation 2.14 Witness (Not the Defendant) Who Takes the Fifth Amendment 2.15 Definition of “Knowingly” 2.16 “Willful Blindness” As a Way of Satisfying “Knowingly” 2.17 Definition of “Willfully” 2.18 Taking a View 2.19 Character Evidence 2.20 Testimony by Defendant
    [Show full text]
  • Ffi Who Want to T¡Mit ;Il:Lr*É:I:Ffi Ï:,Äiï*,",Ï: the Lawsuig Which Is ..But Said Tá Be Worth at Least $2 Their Own Tiability
    After the døaghter of lllinois attorne! general Jim Ryøn died trøgically, tbe famity filed ø personal injury lawsuit_the þind thøt would Ìtøue been : WETVE-YEAR-OI.D AI{IITE Ryan was waking up with painful headaches that led to nausea and vomitinE If her father had not b."n-ex_ periencing his own hellish r:rcrlical- problems, Anniã's p.."rr* *igü h:rve taken a more relaxed, *"i,_-a_r..i"i- rude. But he had been diagnosed earlier with non-Hodgkin,s lymphoma and had spent rnonrhs ¡n rntensive chemotherapy, losing'all his hair, So, as a precautio", A""i.a',í;,h;;t¡Jjü., sixth grader to Children's M.-.;;i park ù;r;'ird; l,incoln to have her l""k.J-;;'i;îf,;äå. ncrrrologist. As she recalls, tt. ¿o"t- tolã Ër',¡," grl,*1s suffering from migrain. .,rrrrÌ,,].1'lg À.rà*f,* ¡;rescnbed some medication. A¡rnie,s mbther rclicvcd. felt drry 91.u.: later, Annie Ryan was dead. t he Ryan familv's shock and and sadness quickly tumed to her situation rng., a.rp"irìnì.,r,"lärrl"äo"_ The battte over tort nres autopsy -ã would do: She instiEated came backîh" reform pits trial *rr. ;l;;;;ä *r, a lawsuit an^undetected against theão.tor she sàp hlmor at the base lr.. L*iïïirc F¿iled to treat her lawyers, with their paren$ daughter prop.tly ,"d tt .-horpiá ,T.111"9.. who have .";u;;;"r *t ri. ,n*"iìy, ,r.,. m ultimillion -dollar ucarh of ,lrï'rr¿i"" correct tests were not performed.
    [Show full text]
  • Cyber Crime and Telecommunications Law
    Rochester Institute of Technology RIT Scholar Works Theses 2010 Cyber crime and telecommunications law Robert Imhof Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Imhof, Robert, "Cyber crime and telecommunications law" (2010). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. ROCHESTER INSTITUTE OF TECHNOLOGY B. THOMAS GOLISANO COLLEGE OF COMPUTING AND INFORMATION SCIENCES CyberCyber CrimeCrime andand TelecommunicationsTelecommunications LawLaw Researched by Robert Imhof Thesis Committee: Charlie Border, Daryl Johnson, Tom Algoe Defense Approved on May 10th, 2010 TableTable ofof ContentsContents Introduction …................................................................................................................. 5 Literature Review ........................................................................................................... 8 Purpose Statement ........................................................................................................... 29 Methodology and Deliverables ....................................................................................... 29 Telecommunications Laws The Computer Fraud and Abuse Act .................................................................... 32 The Digital Millennium Copyright
    [Show full text]
  • April 14 Through April 16 2020 Hearing Summary FINAL
    HEARING FIVE (Days 4-6) REDUCTION OF CRIME April 14 – April 16, 2020 Summary The Dilemma Call to Order and Welcome “I’ve chased contraband cell phones in Chair Phil Keith welcomed the attendees to the fifth hearing of the our prisons in snowstorms, deserts and President’s Commission on Law Enforcement and the half across the country. Criminals do Administration of Justice. On behalf of Attorney General Barr and not stop being criminals when they are his leadership team, Chair Keith expressed appreciation for incarcerated.” everyone’s ability to attend the hearing. Chair Keith greeted and Chief Todd Craig thanked everyone for attending and supporting the teleconference. Opening Statements by Commissioners Chair Keith opened by explaining that the three days of hearings, April 14 through April 16, would focus on crime reduction, including domestic violence and sexual assault; technology issues encountered by law enforcement; and leveraging technology to reduce crime. The first day’s hearing focused on Domestic Violence and Sexual Assault. Witnesses for the hearing included Matthew Gamette, Laboratory System Director, Idaho State Police; Ms. Kim Garrett, CEO of Palomar, Oklahoma City’s Family Justice Center; Richard Hertel, Prosecutor for Ripley County, IN; and Robert Hawkins, Chief of Police, Muscogee Creek Nation. Note: Prior to the hearing, panelist biographies and written testimonies were delivered to the Commissioners for their consideration and review. Domestic Violence and Sexual Assault Panel, April 14, 2020 First Panelist: Matthew Gamette, Laboratory System Director for the Idaho State Police Forensic Services and Chair for the Consortium of Forensic Science Organizations Highlights: • Law enforcement investigators need more access to forensic labs and disciplines because they are losing the ability to perform trace analysis due to the expense and training required for investigators, so courts do not have that evidence to consider.
    [Show full text]
  • Downloading All Material Distributed by Lecturers to Asking Speakers Questions
    Applicable toward CPD Requirement Course Leader Sean Caragata, 3rd Cisco Systems Inc. Course Leader Richard F.D. Corley, Goodmans LLP Rochard Beharry, IT Contracting City of Mississauga Duncan C. Card, & Purchasing Bennett Jones LLP Christopher Cates, Effective contracting, purchasing and managing of IT products Bell Canada and services Edward T. Fan, Torys LLP June 4 & 5, 2015, Toronto Elaine R. Holt, City of Toronto Workshop Included: CLOUD CONTRACTS Christopher N. Hunter, Norton Rose Fulbright Canada LLP course highlights Event! Two-Day Mark Johnson, Infusion • Discover how to implement IT procurement governance best practices • Hear how Accenture successfully negotiates IT deals with its suppliers • Learn to navigate the challenges in software procurement and licensing Wendy Law, • Key into the emerging issues in IT public sector procurement City of Mississauga • Discover how the City of Toronto uses RFPs to create enforceable contractual commitments P. Bradley Limpert, • Benefit from best practices in negotiating IT outsourcing agreements Limpert & Associates • Achieve your service level objectives through clear and well-structured service level agreements • Find out how to develop win-win contact models with your customers Daniel Logan, • Explore the opportunities and challenges in emerging technologies McCarthy Tétrault LLP • Minimize your risks of potential disputes in IT contracts J. Fraser Mann, Mann Symons LLP who should attend Bruno P. Soucy, Blaney McMurtry LLP Private & Public Sector In-house counsel, Executives, Directors
    [Show full text]
  • Michigan IT Lawyer a Publication of the State Bar of Michigan Information Technology Law Section
    State Bar of Michigan Michigan IT Lawyer A Publication of the State Bar of Michigan Information Technology Law Section http://www.michbar.org/it Table of Contents May 2013 . Vol. 30, Issue 3 Bits and Bytes from the Section . Bits and Bytes from the Section ............1 By Karl A. Hochkammer, Honigman Miller Schwartz & Cohn LLP . Wanderlust - The “Curious Exploration” Partial-Access Problems in Campus Local Area Networks ..............................3 I would like to provide a summary of the upcoming events for the IT Law Section, and information about the recently established Privacy Law . Privacy Law Committee .......................... 13 Committee. One of the Section’s main goals for this year is to increase the level of . Information Technology Law Section, State Bar of Michigan Mission engagement with Section members. We are increasing the use of the LinkedIn Statement .............................................14 group ‘IT Law Section of State Bar of Michigan’, http://www.linkedin.com/grou ps?home=&gid=2993995&trk=anet_ug_hm, providing event information, news, . 2013 Edward F. Langs Writing Award ..... 14 and a forum for Section members to communicate with each other. Susanna Brennan graciously agreed to help make this resource of greater interest and . Publicly Available Websites for IT use to members. For those who are not yet members of the Section’s LinkedIn Lawyers ................................................15 group, please join and use this resource to share articles of legal interest, notice of educational or networking events and career opportunities, or to communicate with other Section members. The IT Law Section is proud to announce the formation of the Privacy Law Committee. The Privacy Law Committee is a forum for discussing this new and developing area of the law, which affects a broad range of practices at the state, national and international levels.
    [Show full text]
  • Information Technology & Lawyers
    Information Technology & Lawyers Edited by: Arno R. Lodder Anja Oskamp Contributions by: Kevin D. Ashley Trevor J.M. Bench-Capon Marc Lauritsen Arno R. Lodder Anja Oskamp Marie-Francine Moens Henry Prakken Gerald Quirchmayr Andrew Stranieri John Zeleznikow 2 Lodder/Oskamp (eds.), Information Technology & Lawyers TEMPORARY TABLE OF CONTENTS 1. Introduction: Law, Information Technology, and Artificial Intelligence3 2. Case-based Reasoning.................................................................................5 3. Argumentation.............................................................................................5 4. Knowledge Discovery from Legal Databases – using neural networks and data mining to build legal decision support systems...................................5 5. Improving Access To Legal Information: How Drafting Systems Help.5 6. Internet, WWW, and beyond.....................................................................5 7. Artificial Intelligence in the Real Legal Workplace.................................5 8. References....................................................................................................5 1. Introduction: Law, Information Technology, and Artificial Intelligence Anja Oskamp Arno R. Lodder 1.1. Information Technology and Lawyers Information Technology and lawyers, at first sight not the most natural combina- tion one can think of. Information Technology is fast, schematic, and futuristic; lawyers are cautious, verbose, and old-fashioned. When one of the authors once told a chemist he was working in the field of IT & Law, the first reaction was: “Is there any connection between the two at all?” This was back in 1995. The influ- ence of IT and in particular the internet on law has become ever greater since, and also the use of IT and in particular the internet by lawyers (the side of the IT & Law diptych this book focuses on) has increased significantly. Currently there is indeed a connection between IT & Law that is also clear to people outside the field, viz.
    [Show full text]
  • MASS TORTS at the NEUTRAL FORUM: a CRITICAL ANALYSIS of the ALI’S PROPOSED CHOICE RULE 56 Albany L
    MASS TORTS AT THE NEUTRAL FORUM: A CRITICAL ANALYSIS OF THE ALI’S PROPOSED CHOICE RULE 56 Albany L. Rev. 807 (1993) * Louise Weinberg TABLE OF CONTENTS I. INTRODUCTORY..........................................................809 A. Conflict, crisis, and confusion at the ALI....................809 A motion is defeated....................................................809 The policy problem......................................................811 The irrationality problem.............................................811 B. The proposed liability choice rule for mass tort ........812 The problem of mass litigation disaster in mass disaster litigation......................................................812 The neutral forum and the choice-of-law process .......813 The draft liability choice rule: Its setting ....................814 The draft liability choice rule: Its shape ......................814 II. A CRITIQUE FROM POLICY........................................816 A. Policy at the neutral mass tort forum.........................816 Whatever happened to policy?....................................816 A positivist’s question: Whose policy?......................817 B. National policy and the remedial choice....................818 What is national policy in mass tort cases? .................818 National conflicts policy..............................................819 The defense bias of “neutral” choice rules..................819 The defense bias of “neutral” choice rules..................819 The problem of the impolitic or dangerous choice......822
    [Show full text]
  • Taming the Tort Monster: the American Civil Justice System As a Battleground of Social Theory Michael L
    Brooklyn Law Review Volume 68 | Issue 1 Article 1 9-1-2002 Taming the Tort Monster: The American Civil Justice System as a Battleground of Social Theory Michael L. Rustad Thomas H. Koenig Follow this and additional works at: https://brooklynworks.brooklaw.edu/blr Recommended Citation Michael L. Rustad & Thomas H. Koenig, Taming the Tort Monster: The American Civil Justice System as a Battleground of Social Theory, 68 Brook. L. Rev. 1 (2002). Available at: https://brooklynworks.brooklaw.edu/blr/vol68/iss1/1 This Article is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Law Review by an authorized editor of BrooklynWorks. Brooklyn Law Review Volume 68 2002 Number 1 ARTICLES TAMING THE TORT MONSTER: THE AMERICAN CIVIL JUSTICE SYSTEM AS A BATTLEGROUND OF SOCIAL THEORY' Michael L. Rustadt & Thomas H. Koenig* 02002 Michael L. Rustad & Thomas H. Koenig. All Rights Reserved. Michael L. Rustad is the Thomas F. Lambert Jr. Professor of Law and Director of the Intellectual Property Law Program at Suffolk University Law School School. B.A. 1971, University of North Dakota; M.A. 1973, University of Maryland; Ph.D. 1981, Boston College; J.D. 1984, Suffolk University Law School; LL.M. 1986, Harvard University Law School. Thomas Koenig is Professor, Department of Sociology and Law, Policy and Society Doctoral Program, Northeastern University. A.B. 1971, University of California, Santa Cruz; M.A. 1973, University of California Santa Barbara; Ph.D. 1979, University of California, Santa Barbara. This article is dedicated to the memory of Thomas F.
    [Show full text]
  • The Effects of Higher Education on Law Enforcement
    California State University, San Bernardino CSUSB ScholarWorks Theses Digitization Project John M. Pfau Library 2004 The effects of higher education on law enforcement Harrison Tolbert Follow this and additional works at: https://scholarworks.lib.csusb.edu/etd-project Part of the Human Resources Management Commons, and the Law Enforcement and Corrections Commons Recommended Citation Tolbert, Harrison, "The effects of higher education on law enforcement" (2004). Theses Digitization Project. 2537. https://scholarworks.lib.csusb.edu/etd-project/2537 This Project is brought to you for free and open access by the John M. Pfau Library at CSUSB ScholarWorks. It has been accepted for inclusion in Theses Digitization Project by an authorized administrator of CSUSB ScholarWorks. For more information, please contact [email protected]. THE EFFECTS OF HIGHER EDUCATION ON LAW ENFORCEMENT A Project Presented to the Faculty of California State University, San Bernardino In Partial Fulfillment of the Requirements for the Degree Master of Public Administration by Harrison Tolbert September 2004 THE EFFECTS OF HIGHER EDUCATION ON LAW ENFORCEMENT A Project Presented to the Faculty of California State University, San Bernardino by Harrison Tolbert September 2004 Approved by: ABSTRACT The police departments around the United States today- are facing many changes. Society is changing in many ways. The number of minorities and the educational level of society is increasing yearly. There is a big push to professionalize policing. When policing is compared with- other professional jobs, policing is the one that requires the least amount of education. Many departments still accept a high school degree as the minimum education required to join the police force.
    [Show full text]