Home

group-photo

Current Issue

Volume 18, Number 1In Search of the Golden Mean: Examining the Impact of the President’s Proposed Changes to the CFAA on Combatting Insider Misuse

Shawn E. Tuma
18 SMU Sci. & Tech. L. Rev. 3
How do we prevent privileged users from using their authorization to (1) misuse computers or data during authorized use, or (2) misuse data obtained during an authorized use, after the time of the authorized access? This article examines two structural changes to the statutory language of the CFAA, recommended by President Obama in the CFAA Amendment, aimed at answering these questions. First, it examines the negation of the civil cause of action under the CFAA, which would occur if the factors set forth in subsection 18 U.S.C. § 1030(c)(4)(A)(i) were removed, as recommended by the CFAA Amendment. Second, the article examines the amended definition of “exceeding authorized access,” and analyzes how the change in language will impact the overall objective of combatting insider misuse of computers and data.
Read this article online:* Subscription Required

Online Free Speech or Materially Supporting Terrorism?

Dorlin A. Armijo
18 SMU Sci. & Tech. L. Rev. 37
Do the “material support” statutes, which punish individuals who provide material support to terroristic groups, criminalize a citizen’s constitutionally protected right to association and freedom of speech where those rights are used to advocate for terrorist organizations? The First Circuit Court of Appeals recently failed to address the constitutional concerns presented by a conviction under Sections 2339A and 2339B, impliedly permitting a criminal conviction based only on a person’s online activity. By failing to adjudicate which behaviors triggered the federal material support statute, the First Circuit creates a dangerous precedent against online participants that seek to encourage discourse by chilling discourse not only within the context of terrorism, but also with regard to religious principles and practices.
Read this article online:* Subscription Required

De-Clawing Katz: Emerging Technology and the Exclusionary Rule

Samuel C. Cole
18 SMU Sci. & Tech. L. Rev. 47
As technology changes, however, so do our reasonable expectations of privacy. Under Kyllo v. United States, 533 U.S. 27 (2001), courts—and, by extension, police officers—should interpret Fourth Amendment jurisprudence related to emerging technology broadly when the courts expand Fourth Amendment protections. A logical corollary to this rule is that courts and police officers should interpret Fourth Amendment jurisprudence related to emerging technology narrowly when the courts limit the scope of Fourth Amendment protections. Nonetheless, the Fourth Circuit’s holding in United States v. Stephens, 764 F.3d 327 (4th Cir. 2014), allows police officers or other federal agents to interpret binding Fourth Amendment jurisprudence too broadly—even when it relates to the ever-changing world of technology. Under the rule set forth by the Stephens court, there is nothing to deter federal officers from broadly interpreting precedent which limits Fourth Amendment protection, thereby de-clawing the Fourth Amendment and leaving our right to privacy at the mercy of advances in technology.
Read this article online:* Subscription Required

The “Reasonable Certainty” Standard for Patent Claim Definiteness: The Standard’s Backdrop and its Effect on the Balance of Power in Patent Infringement Actions

Ekaterina G. Long
18 SMU Sci. & Tech. L. Rev. 59
In Nautilus v. Biosig Instruments, 134 S. Ct. 2120 (2014), the United States Supreme Court found that the Federal Circuit’s “insolubly ambiguous” standard for evaluating a patent’s definiteness was inadequate because it failed to comport with the competing concerns underlying section 112. The Court instead opted for a “reasonable certainty” standard, which provides that patent claims must be “viewed in light of the specification and prosecution history . . . [so as to] inform those skilled in the art about the scope of the invention with reasonable certainty.” The addition of the reasonableness inquiry into the analysis means that indefiniteness will move away from a pure question of law and into a factual inquiry. Whether a disputed claim term is indefinite has traditionally been seen as part of claim construction but, following Nautilus, has the potential of being shifted to a question for trial.

 

News & Events


Fall 2016 Food Law Symposium

This fall, the SMU Science & Technology Law Review is proud to co-host a Food Law Forum with Strasburger & Price, LLP and Michigan State University. The Forum will be held on the SMU Dedman School of Law campus on Friday, September 9th. The event will feature panel discussions from prominent lawyers and legal scholars from both the DFW legal community and nationwide. The discussions will cover two current and complex issues in Food Law. The first is the recent developments concerning the labeling of Genetically Modified Organism (GMO) products that have taken shape since the Supreme Court’s decision in Sorrell v. IMS. The second is the complex regulation of food manufacturing, and will feature panels outlining the prevention, liability, and legal enforcement in the event of manufacturing irregularities, such as the recent listeria concerns surrounding Blue Bell. This Forum will be a thorough and current examination of fascinating legal topics that have a direct impact on the daily life of consumers and the constitutional liberties inherent in marketplace competition.

Register Now for the Fall 2015 Cyber Security Symposium

Registration for the Fall 2015 Cyber Security Symposium, which will take place on October 23, is now open. The Symposium will cover cyber security privacy and rights, the global threat of cyber crime, and issues in cyber security and healthcare.

For more information, click here.


Congratulations to the Students Selected for Publication!

Three student works were published in the Volume 18, Spring 2015 edition of the Journal.


Congratulations to our new 2015-2016 Staff Editors!

We thank everyone who participated in the write-on competition and we are excited to welcome all of our incoming staff editors!


The Journal is proud to announce the Fall 2015 Cyber Security Symposium

The Fall 2015 Symposium will be centered around Cyber Security primarily focusing on cyber security, the global threat of cyber crime, and privacy issues. Any professors, judges, attorneys, or any other legal scholars interested in presenting or attending are welcome to contact the Journal at scitech@smu.edu.


Congratulations to the 2015-2016 Executive Board!

We are excited to welcome the 2015-2016 incoming staff editors!