Printer Friendly

Forty-second selected bibliography on computers, technology and the law: (January 2010 through December 2010).

INTRODUCTION

Each year, the Journal provides a compilation of the most important and timely articles on computers, technology, and the law. The Bibliography, indexed by subject matter, is designed to be a research guide at assist our readers in searching for recent articles on computer and technology law. This year's annual Bibliography contains nearly 800 articles, found through examination of over 1000 periodicals.

The Bibliography aims to include topics on every legal aspect of computers and technology. However, as new issues in this field emerge, we welcome your suggestions for additional topics and sources, as well as your commentary on the Bibliography.
INDEX

1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE

     1.0 General
     1.1 Computerized Legal Research

         1.2.0 General
         1.2.1 Online Legal Research

1.2 Law Office Management

     1.2.0 General

     1.2.1 Office Automation

         1.2.2 Case Management
         1.2.3 Case File Security
         1.2.4 Internet Access

     1.3 Selected Uses in the Law Practice
         1.3.0 General
         1.3.1 Tax Filing
         1.3.2 Bankruptcy
         1.3.3 Estate Planning
         1.3.4 Real Estate
         1.3.5 Advertising

2. COMPUTERS AND TECHNOLOGY IN LITIGATION

     2.0 General

     2.1 Scientific Evidence
         2.1.0 General
         2.1.1 Expert Testimony
         2.1.2 DNA Typing
         2.1.3 Fingerprint
         2.1.4 Lie Detection
         2.1.5 Forensic Evidence

     2.2 Demonstrative Evidence

         2.2.0 General
         2.2.1 Computer-Generated Evidence
         2.2.2 Audio/Visual Evidence

     2.3 Electronic Discovery

     2.4 Courtroom and Judges

     2.5 Dispute Resolution

3. COMPUTERS, TECHNOLOGY AND THE GOVERNMENT
     3.0 General
     3.1 Computers, Technology and Law Enforcement
     3.2 Use of Computers and Technology by the Military
     3.3 Use of Computers and Technology by State and
         Federal Legislatures
     3.4 Regulation of Computers and Technology

         3.4.0 General
         3.4.1 First Amendment Concerns
         3.4.2 Antitrust
         3.4.3 FCC Regulation
         3.4.4 SEC Regulation

4. ISSUES OF PRIVACY, SECURITY AND CRIME

     4.0 General

     4.1 Problems of Privacy
         4.1.0 General
         4.1.1 Data Privacy
         4.1.2 Privacy in the Workplace

     4.2 Security

         4.2.0 General
         4.2.1 Cyberwar
         4.2.2 Encryption and Digital Signatures

     4.3 Crime

         4.3.0 General
         4.3.1 Internet

5. COMPUTERS, TECHNOLOGY AND EDUCATION
     5.0 General
     5.1 Legal Education

6. COMPUTERS, TECHNOLOGY AND BUSINESS
     6.0 General
     6.1 Electronic Commerce
         6.1.0 General
         6.1.1 Taxation
     6.2 Computers in Banking and Finance
         6.2.0 General
         6.2.1 On-line Securities Trading
     6.3 Computers and Technology in the Transportation
         Industry
     6.4 Computers and Technology in the Publishing Industry
     6.5 Computers and Technology in Advertising
     6.6 Computers and Technology in Accounting

7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTERS
   AND TECHNOLOGY

     7.0 General
     7.1 Patent

         7.1.0 General
         7.1.1 Software Patent
         7.1.2 Biotech Patent

     7.2 Software Copyright
         7.2.0 General
         7.2.1 User Interface
         7.2.2 Fair Use
         7.2.3 Video Game

7.3 Digital Copyright

         7.3.0 General
         7.3.1 Electronic Compilation
         7.3.2 Computer Database
         7.3.3 Multimedia
         7.3.4 Computer-Generated Works

     7.4 Trademark

     7.5 Trade Secret

     7.6 Semiconductor Chip Protection

     7.7 Licensing

     7.8 Intellectual Property Issues of the Internet

     7.9 International Developments
         7.9.0 General
         7.9.1 GATT-TRIPS
         7.9.2 NAFTA
         7.9.3 Developments in Canada
         7.9.4 Developments in Mexico and Latin America
         7.9.5 Developments in Australia and New Zealand
         7.9.6 Developments in Africa
         7.9.7 Developments in Asia
         7.9.8 Developments in Western Europe
         7.9.9 Developments in Eastern Europe and Russia

8. COMPUTERS AND LEGAL REASONING
     8.0 General
     8.1 Artificial Intelligence

9. LEGAL ISSUES OF THE INTERNET
     9.0 General
     9.1 ISP and Internet Access
         9.1.0 General
         9.1.1 Net Neutrality

     9.2 Domain Names
     9.3 Civil Procedure in Cyberspace
     9.4 Online Communities
         9.4.0 General
         9.4.1 Social Networking
         9.4.2 Virtual Worlds

     9.5 First Amendment Concerns

10. LAW AND TECHNOLOGY

     10.0 General
     10.1 Technology Transfer
     10.2 Audio/Video Recording
     10.3 Space Law
     10.4 Medical Technology

         10.4.0 General
         10.4.1 Electronic Records

     10.5 Science and Technology
         10.5.0 General
         10.5.1 Biotechnology
         10.5.2 Pharmaceuticals
         10.5.3 Stem Cells and Cloning
         10.5.4 Nanotechnology

     10.6 Environmental Law
         10.6.0 General
         10.6.1 Pollution
         10.6.2 Hazardous Substances
         10.6.3 Electromagnetic Fields
         10.6.4 Nuclear Technology
         10.6.5 Energy and the Environment
         10.6.6 International Environmental Law
                Developments

     10.7 Television
         10.7.0 General
         10.7.1 Satellite Television
         10.7.2 Cable Television

     10.8 Telecommunications
         10.8.0 General
         10.8.1 Telephone
         10.8.2 Multimedia in Telecommunications
         10.8.3 International Telecommunications
                Developments

     10.9 Recording Industry

     10.10 Broadband

11. FAMILY LAW

12. OTHER

BIBLIOGRAPHY

1. COMPUTERS AND TECHNOLOGY IN LAW PRACTICE
     1.0 General

         Rachel Flipse, Comment, An Unbalanced Standard:
         Search And Seizure of Electornic Data Under the Border
         Search Doctrine, 12 CONST. L. J. 3 (2010).

         Richard M. Goehler et al., Technology Traps: Ethical
         Considerations for Litigators in a 24/7 Online World, 36
         LITI6., no. 2, 2010, at 34.

         Mark Herrman, Memoirs of a Blogger, 36 LITIG., no. 2,
         2010, at 46.

         Bernard J. Hibbitts, Essay, The Technology of Law, 102
         LAW LIBR. J. 101 (2010).

         Terry Isner, Five Ways to Use Video on Your Firm's Web
         Site, LAW PRAC., May/June 2010, at 39.

         Sharon Nelson & John Simek, Making Your Website
         Visible: How to Find a Good SEO Company, LAW PRAC.,
         May/June 2010, at 24.

         Tony Santiago, Solving the Challenges in Tax Recruiting
         Technology--A Historical Perspective on the Online
         Evolution of the "Apply First" Mentality, 28 J. ST. TAX'N
         45 (2010).

1.1 Computerized Legal Research
     1.2.0 General

         Carolyn Elefant & Nicole Black, How to Use
         Social Media to Network and Build Relationships,
         LAW PR.AC., May/June 2010, at 40.

         Creighton J. Miller, Jr. & Annmarie Zell, Keeping
         up with New Legal Titles: You Don't Look Like a
         Librarian: Shattering Stereotypes and Creating
         Positive New Images in the Internet Age, 102 LAW
         LIBR. J. 123 (2010) (reviewing RUTH KNEALE,
         YOU DON' Y LOOK LIKE A LIBRARIAN:
         SHATTERING STEREOTYPES AND CREATING
         POSITIVE NEW IMAGES IN THE INTERNET AGE
         (2009)).

1.2.1 Online Legal Research

         David G. Badertscher & Deborah E. Melnick, Is
         Primary Legal Information on the Web
         Trustworthy?, 49 JUDGES' J. 13 (2010).

         Shun-Ling Chen, Wikipedia: A Republic of Science
         Democratized, 20 ALB. L.J. SCI & TECH. 247 (2010).

         Casey R. Fronk, The Cost of Judicial Citation: an
         Empirical Investigation of Citation Practices in the
         Federal Appellate Courts, 2010 U. ILL. J.L. TECH. &
         POL'Y 51 (2010).

         Frederick B. Jonassen, Online Legal Research
         Workshops, 22 ST. THOMAS L. REV. 470 (2010).

         Tamsin Maxwell & Burkhard Schafer, Natural
         language processing and query expansion in legal
         information retrieval: Challenges and a response, 24
         INT'L REV. LAW, COMP. & TECH. 63 (2010).

         Jason C. Miller & Hannah B. Murray, Wikipedia in
         Court: When and How Citing Wikipedia and Other
         Consensus Websites is Appropriate, 84 ST. JOHN'S L.
         REV. 633 (2010).

         Robert Miller, Feature United Nations Databases
         And Web Sites For Legal Research And Education,
         RES GESTAE, Oct. 2010, at 12.

         Jennifer J. Rose, The Mailing List Review, 15 No. 9
         GLILR 7 (2010).

         Lauren B. Solberg, Data Mining on Facebook: a
         Free Space for Researchers or an Irb
         Nightmare?, 2010 U. ILL. J.L. TECH. & POL'Y 311
         (2010).

         Susan Valle, Highlight from The Prosecutor It's
         Here: Close Encounters Of The Web Kind,
         PROSECUTOR, Dec. 2010, at 28.

         Donald Wochna, Electronic Data, Electronic
         Searching, Inadvertent Production of Privileged
         Data: A Perfect Storm, 43 AKRON L. REV. 847
         (2010).

1.2 Law Office Management
     1.2.0 General

         Andrew Z. Adkins III, CMS Adoption Rate Should be
         Higher, 28 LEGAL TECH. NEWSL., no. 1, 2010.

         Roberta Gelb, Best Practices for Transitioning to
         Word2007, 27 LEGAL TECH. NEWSL., no. 10, 2010.

         Robert W. Hillman & Allison D. Rhodes, Client
         Files and Digital Law Practices: Rethinking Old
         Concepts in an Era of Lawyer Mobility, 43 SUFFOLK
         U. L. REV. 897 (2010).

         David Hobbie, Personal Knowledge Management:
         Turning Down the Information Fire Hose, LAW
         PRAC., Mar./Apr. 2010, 26.

         Sue Hughes, IT Strategies to Make Firms More
         Efficient and Competitive, 28 LEGAL TECH. NEWSL.,
         no. 2, 2010.

         Sue Hughes, Outlook Tips, Tricks and Gotchas, 27
         LEGAL TECH. NEWSL., no. 12, 2010.

         Ryan E. Ladisic, Challenges and Solutions for
         Electronic Billing, 27 LEGAL TECH. NEWSL., no. 11,
         2010.

         Carole Levitt & Mark Rosch, Free Productivity
         Power Tools From Google, LAW PRAC., May/June
         2010, 27.

         Robert C. Mattern, Managing Support Services, Cost
         Recovery and Output Management Strategy, 27
         LEGAL TECH. NEWSL., no. 10, 2010.

         Eric Mosca, Achieving Law Firm e-Mail Utopia, 27
         LEGAL TECH. NEWSL., no. 12, 2010.

         Susan M. Thurston, Registration and Training for
         Electronic Filing Now a Completely Online

         Experience!, AM. BANKR. INST. J., May 2010, at 26.

     1.2.1 Office Automation

         Ron Best & Dean Gonsowski, Recommended
         Practices for Document Review Workflow, 28 LEGAL
         TECH. NEWSL., no. 6, 2010.

         Bruce Bial, Riemer & Braunstein Benefits from
         Storage Virtualization, 28 LEGAL TECH. NEWSL., no.
         4, 2010.

         Jean Hay, Bond Schoeneck & King Goes Mobile with
         Big Hand, 28 LEGAL TECH. NEWSL., no. 5, 2010.
         Karen Reiter, Getting Users to Adopt New
         Productivity Tools, 28 LEGAL TECH. NEWSL., no. 5,
         2010.

         Scott Y. Stuart & Liz Cohen, Managing the Message
         in Real Time: Crisis Communication in the Instant-Information
         Age, AM. BANKR. INST. J., Nov. 2010, at
         24.

         Stephen M. Terrell, Feature Law Office Technology
         Converting To A Mac Law Office--One Lawyer's
         Experience, RES GESTAE, June 2010, at 30.

         Lance Waagner, Upgrading Microsoft Office and
         What it Means to Your Service Desk, 28 LEGAL
         TECH. NEWSL., no. 5, 2010.

     1.2.2 Case Management

         Matthew Hurd, How Technology Can Drive Effective
         Case Collaboration, 28 LEGAL TECH. NEWSL., no. 6,
         2010.

         Erik Mazzone, Here, There, and Everywhere: Web-Based
         Tools for Managing Nonbillable Projects,
         LAW PRAC., Nov./Dec. 2010, 21.

         Curt Meltzer, Product Review: American LegalNet's
         eDockets, 28 LEGAL TECH. NEWSL., no. 6, 2010.

         Megan E. McEnroe, Commentary, E-mail in
         Attorney-Client Communications: A Survey of
         Significant Developments April 2009-June 2010, 66
         BUS. LAW. 191 (2010).

     1.2.3 Case File Security

         Darryl d'Aquin, Backup Protection and Continuity
         Keep Firms Running, 28 LEGAL TECH. NEWSL., no.
         1, 2010.

         Michael Downey, 12 Tips for Reducing Online
         Dangers and Liabilities, LAW PRAC., July/Aug.
         2010, 26.

         Rakesh Madhava, Cloud-Safe: 10 Things You Should
         Know about Cloud Computer Security, 28 LEGAL
         TECH. NEWSL., no. 4, 2010.

         Peter Roberts, Protecting Client Data--11 Steps to
         Take when Using Technology, LAW PRAC.,
         Mar./Apr. 2010, 48.

     1.2.4 Internet Access

         John Soma, Melodi Mosley Gates, & Michael Smith,
         Bit-Wise but Privacy Foolish: Smarter E-Messaging
         Technologies Call for a Return to Core Privacy
         Principles, 20 ALB. L.J. SCI & TECH. 487 (2010).

1.3 Selected Uses in the Law Practice
     1.3.0 General

         Thomas R. Dominczyk, Rule 9037. Consequences of
         Failure to Redact "Personal Data Identifiers," AM.
         BANKR. INST. J., Apr. 2010, at 14.

         Michael P. Richman & Melissa Iachan, Combating
         Strategic Incivility in Cyberspace--Part II:
         Intervention by Court and Bar Associations, AM.
         BANKR. INST. J., Sept. 2010, at 22.

         Timothy A. Perkins, Commentary, Feature Story:
         Twittering for Attention, 46 TENN. B.J. 19 (2010).

         Andrew J. Seger, Note & Comment, Real-Time
         Electronic Contact:--Advertising Rules Applied to
         Lawyers Who Blog, 41 U. TOE. L. REV. 1005 (2010).

         Kathleen Elliott Vinson, The Blurred Boundaries of
         Social Networking in the Legal Field: Just "Face"
         It, 41 U. MEM. L. REV. 355 (2010).

     1.3.1 Tax Filing

         Alvin L. Arnold and Marshall E. Tracht, Deductions:
         Web Site Expenses, REAL EST. L. REP., Dec. 2010, at
         6.

         Randall Farrar, Microsoft Word 2007 'Track
         Changes' and 'Compare,' 27 LEGAL TECH. NEWSL.,
         no. 12, 2010.

         Stephen P Valenti, The Smartphone: The Tax
         Practitioner's Portable Office, THE TAX ADVISER,
         Jan. 2010, at 206.

     1.3.2 Bankruptcy

         Julee Noguchi et al., Bankruptcy and the Data
         Deluge: Working with Technology Professionals for
         Effective Outcomes, AM. BANKR. INST. J., Nov.
         2010, at 34.

         Alan S. Trust, What Constitutes an E-Mergency: Not
         Your Parents' Emergencies: Part I, AM. BANKR.
         INST. J., Nov. 2010, at 42.

     1.3.3 Estate Planning

     1.3.4 Real Estate

         Michael E. Doversberger, Note, Conveyancing at a
         Crossroads: The Transition to e-Conveyancing
         Applications in the U.S. and Abroad, 20 IND. INT'L
         & COMP. L. REV. 281 (2010).

     1.3.5 Advertising

2. COMPUTERS AND TECHNOLOGY IN LITIGATION
     2.0 General

         Kevin Bennardo, At Issue Waiver of the Attorney-Client
         Privilege in Illinois: An Exception in Need of a
         Standard, 30 N. ILL. U. L. REV. 553 (2010).

         Colin Cafferty, Can a Computer Read a Doctor's Mind?
         Whether Using Data Mining as Proof in Healthcare Fraud
         Cases is Consistent with the Law of Evidence, 30 N. ILL. U.
         L. REV. 509 (2010).

         Andrew J. Cavo, The Ethics of "Mining for Metadata," 20
         ALB. L.J. SCI. & TECH. 231 (2010).

         Alexander J. Geocaris, Vehicle Search Incident to a Lawful
         Arrest: The New Two-Part Rule from Arizona v. Gant
         Misses the Mark, 30 N. ILL. U. L. REV. 575 (2010).

         Alisdair A. Gillespie, Court of Appeal: Racially Offensive
         Web Postings, 74 J. CRIM. L. 205 (2010).

         Roy S. Gutterman, 2008-2009 Survey of New York Law:
         Media Law, 60 SYRACUSE L. REV. 1041 (2010).

         Andrew W. Jurs, Science Court: Past Proposals, Current
         Considerations, and a Suggested Structure, 15 VA. J.L. &
         TECH. 1 (2010).

         Jason Meares, Getting Ready to Settle: The Exclusion of
         Settled Defendants and Ready v. United/Goedecke
         Services, Inc. 's Impact Upon Statutory Interpretation in
         Illinois, 30 N. ILL. U. L. REV. 607 (2010).

         Nicholas J. Patterson, The Key Theory: Authenticating
         Decrypted Information in Litigation While Protecting
         Sensitive Sources and Methods, 88 TEX. L. REV. 1767
         (2010).

         Andrew M. Perlman, The Legal Ethics of Metadata
         Mining, 43 AKRON L. REV. 785 (2010).

         Rebecca Phillips, Comment, Constitutional Protection for
         Nonmedia Defendants: Should There be a Distinction
         Between You and Larry King?,33 CAMPBELL L. REV. 171
         (2010).

         Colin T. Reardon, Note, Pleading In The Information Age,
         85 N.Y.U.L. REV. 2170 (2010).

         Eddie Sheehy, Information Governance: 5 Strategies to
         Radically Reduce Risk, 43 L./TECH., no. 2, 2010, 16.

         Bradley M. Smyer, Note, Interactive Computer Service
         Liability for User-Generated Content After
         Roommates.com+, 43 U. MICH. J.L. REFORM 811 (2010).

         A Discussion of the Seventh Circuit's Electronic Discovery
         Pilot Program and Its Impact on Early Case
         Assessment, 30 N. ILL. U. L. REV. 563 (2010).

         Jason M. Swergold, Note, To Have and to Hold: The
         Future of DNA Retention in the United Kingdom, 33 B.C.
         INT'L & COMP. L. REV. 179 (2010).

         Judge Samuel A. Thumma, The Trials and Tribulations-and
         Benefits--of Technology One Judge's Advice for
         Attorneys, 49 JUDGES' J. 15 (2010).

         Lee Tien, Litigating the State Secrets Privilege, 42 CASE
         W. RES J. INT'L L. 675 (2010).

2.1 Scientific Evidence
     2.1.0 General

         Teneille Brown & Emily Murphy, Through a
         Scanner Darkly: Functional Neuroimaging as
         Evidence of a Criminal Defendant's Past Mental
         States, 62 STAN. L. REV. 1119 (2010).

         E. Spencer Compton, Note, Not Guilty by Reason of
         Neuroimaging: The Need for Cautionary Jury
         Instructions for Neuroscience Evidence in Criminal
         Trials, 12 VAND. J. ENT. & TECH. L. 333 (2010).

         James R. Ehleringer & Scott M. Matheson, Jr.,
         Stable Isotopes and Courts, 2010 UTAH L. REV. 385
         (2010).

         Paul C. Giannell, Independent Crime Laboratories:
         The Problem of Motivational and Cognitive Bias,
         2010 UTAH L. REV. 247 (2010).

         Daniel S. Medwed, Path Forward or Road to
         Nowhere? Implications of the 2009 National
         Academy of Sciences Report on the Forensic
         Sciences, 2010 UTAH L. REV. 221 (2010).

         Jacqueline McMurtrie, Swirls and Whorls: Litigating
         Post-Conviction Claims of Fingerprint
         Misidentification after the NAS Report, 2010 UTAH
         L. REV. 267 (2010).

         Jennifer L. Mnookin, The Courts, the NAS, and the
         Future of Forensic Science, 75 BROOK. L. REV. 1209
         (2010).

         Joelle Anne Moreno, C.S.I. BullS#!t: The National
         Academy of Sciences, Melendez-Diaz v.
         Massachusetts, and Future Challenges to Forensic
         Science and Forensic Experts, 2010 UTAH L. REV.
         327 (2010).

         Daniel G. Orenstein, Shaken to the Core: Emerging
         Scientific Opinion and Post-Conviction Relief in
         Cases of Shaken Baby Syndrome, 42 ARIZ. ST. L.J.
         1305 (2010).

         Michael S. Pardo, Evidence Theory and the NAS
         Report on Forensic Science, 2010 UTAH L. REV. 367
         (2010).

         D. Michael Risinger, The NAS/NRC Report on
         Forensic Science: A Path Forward Fraught with
         Pitfalls, 2010 UTAH L. REV. 225 (2010).

         Hon. Donald E. Shelton, Juror Expectations for
         Scientific Evidence in Criminal Cases: Perceptions
         and Reality about the "CSI Effect" Myth, 27 T.M.
         COOLEY L. REV. 1 (2010).

     2.1.1 Expert Testimony

     2.1.2 DNA Typing

         Liz Campbell, DNA Databases and Innocent
         Persons. Lessons From Scotland?, 2010 JURIDICAL
         REV. 285 (2010).

         Jessica D. Gabel, Probable Cause from Probable
         Bonds: A Genetic Tattle Tale Based on Familial
         DNA, 21 HASTINGS WOMEN'S L.J. 3 (2010).

         Michael P. Luongo, Note, Post-Conviction Due
         Process Right to Access DNA Evidence: Dist.
         Attorney's Office v. Osborne, 129 S. Ct. 2308
         (2009), 29 TEMP. J. SCI. TECH. & ENVTL. L. 127
         (2010).

         Andrea Roth, Safety In Numbers? Deciding When
         DNA Alone is Enough To Convict, 85 N.Y.U.L. REV.
         1130 (2010).

     2.1.3 Fingerprint

     2.1.4 Lie Detection

         Jennifer Chandler, Reading The Judicial Mind:
         Predicting the Courts' Reaction to the Use of
         Neuroscientific Evidence for Lie Detection, 33
         DALHOUSIE L.J. 85 (2010).

     2.1.5 Forensic Evidence

         Peter Ash & Jeffrey L. Metzner, The Mental Status
         Examination in the Age of the Internet--Challenges
         and Opportunities, 38 J. AM. ACAD. PSYCHIATRY L.
         27 (2010).

         Barbara Downer, Using Lab Color Mode in Adobe
         Photoshop[R] to Differentiate Between Black
         Ballpoint Pen Inks, 20 J. FORENSIC DOCUMENT
         EXAMINATION 71 (2010).

         Harry T. Edwards, The National Academy of
         Sciences Report on Forensic Sciences: What it
         Means for the Bench and Bar, 51 JURIMETRICS J. 1
         (2010).

         Patricia R. Recupero, The Mental Status Examination
         in the Age of the Internet, 38 J. AM. ACAD.
         PSYCHIATRY L. 15 (2010).

2.2 Demonstrative Evidence
     2.2.0 General

         Nathan J. Buchok, Plotting a Course for GPS
         Evidence, 28 QUINNIPIAC L. REV. 1019, (2010).

         Erick J. Poorbaugh, Interfacing Your Accuser:
         Computerized Evidence and The Confrontation
         Clause Following Melendez-Diaz, 23 REGENT U.L.
         REV. 213, (2010).

         Joel M. Schumm, Myspace, Youtube Evidence
         Admissibility, Other Holdings, RES GESTAE,
         Jan./Feb. 2010, at 48.

     2.2.1 Computer-Generated Evidence

         Christine Musil, Bye-Bye Black Marker, 43
         L./TECH., no. 2, 2010, 10.

     2.2.2 Audio/Visual Evidence

         Renee, M. Hutchins, The Anatomy of a Search:
         Intrusiveness and the Fourth Amendment, 44 U.
         RICH. L.R. 1185 (2010).

         Sean Smith, Highlights From The Prosecutor
         Highlights Tech Tips: Demystifying The Use Of
         Video At Trial (Part Three Of Three), PROSECUTOR,
         Mar. 2010, at 34.

     2.3 Electronic Discovery

         Debra Lyn Bassett, Reasonableness in E-Discovery, 32
         CAMPBELL L. REV. 435 (2010).

         Steven C. Bennett, Are E-Discovery Costs Recoverable by
         a Prevailing Party?, 20 ALB. L.J. SCI & TECH. 537 (2010).

         Matthew C. Berntsen, Knowledge and Misfeasance:
         Tiffany v. Ebay and the Knowledge Requirement of
         Contributory Trademark Infringement, 16 B.U.J. SCI. &
         TECH. L. 102 (2010).

         Brad Bonnington, e-Discovery Software Connects the Dots
         for Case Processing at Fenwick & West, 28 LEGAL TECH.
         NEWSL., no. 2, 2010.

         Nadia Branno, Business Intelligence and E-Discovery, 22
         INTELL. PROP. & TECH. L. J. 1 (2010).

         Nick Brestoff, E-Discovery and the Range of Sanctions for
         Failure to Comply with Them, 43 L./TECH., no. 2, 2010, 1.

         Nick Brestoff, E-Discovery Search: The Truth, the
         Statistical Truth, and Nothing but the Statistical Truth, 43
         L./TECH., no. 3, 2010, 1.

         Anna M. Bryan et al., Electronic Discovery and
         Healthcare Litigation: Government Influence on
         Conversion to Electronic Healthcare Records, and How it
         has and Will Continue to Impact the Discovery Process, 23
         HEALTH LAW. 1 (Oct. 2010).

         Marla R. Butler, Electronically Stored Information: From
         Pre-Suit to Trial, 22 INTELL. PROP. & TECH. L. J. 3 (2010).

         Timothy J. Chorvat & Laura E. Pelanek, Electronically
         Stored Information in Litigation, 66 Bus. LAW. 183 (2010).

         John Connell & R. Jason Straight, Electronic Discovery's
         Impact: Policies, Technology, and Security, 28 LEGAL
         TECH. NEWSL., no. 9, 2010.

         David Deusner, Is an Integrated e-Discovery Solution the
         Best Approach? 28 LEGAL TECH. NEWSL., no. 6, 2010.

         Gaetano Ferro et al., Electronically Stored Information:
         What Matrimonial Lawyers And Computer Forensics Need
         To Know, 23 J. AM. ACAD. MATRIM. LAW. 1 (2010).

         Sheldon M. Finkelstein & Evelyn R. Storch, Admissibility
         Of Electronically Stored Information: It's Still The Same
         Old Story, 23 J. AM. ACAD. MATRIM. L. 45 (2010).

         Bruce N. Furukawa, Containing Costs with Concept
         Searching Saves Client Thousands, 28 LEGAL TECH.
         NEWSL., no. 1, 2010.

         Daniel B. Garrie & Daniel K. Gelb, E-Discovery in
         Criminal Cases: A Need for Specific Rules, 43 SUFFOLK U.
         L. REV. 393 (2010).

         Randal Girouard, How Haynes and Boone Automated its
         e-Discovery Processes, 28 LEGAL TECH. NEWSL., no. 2,
         2010.

         Dean Gonsowski, Balancing People and Processes with
         Technology in e-Discovery, 28 LEGAL TECH. NEWSL., no.
         3, 2010.

         Regina A. Jytyla & Kelly D. Kubacki, IT's Importance in
         Proper ESI Management, 27 LEGAL TECH. NEWSL., no. 11,
         2010.

         Jonathan L. Moore, Time for an Upgrade: Amending the
         Federal Rules of Evidence to Address the Challenges of
         Electronically Stored Information in Civil Litigation, 50
         JURIMETR1CS J. 147 (2010).

         Evan E. North, Note, Facebook Isn't Your Space Anymore:
         Discovery of Social Networking Websites, 58 U. KAN. L.
         REV. 1279 (2010).

         Betsey Pittard, Making Waves with Technology: An eDiscovery
         Case Study, 28 LEGAL TECH. NEWSL., no. 3,
         2010.

         Marian Riedy et al., Mediated Investigative E-Discovery,
         2010 FED. CTS. L. REV. 79 (2010).

         Mathew Robertson, Why Invisible Electronic Data Is
         Relevant In Today's Legal Arena, 23 J. AM. ACAD.
         MATRIM. L. 199 (2010).

         Amanda Showalter, "What's Yours Is Mine": Inadvertent
         Disclosure Of Electronically Stored Privileged Information
         In Divorce Litigation, 23 J. AM. ACAD. MATRIM. L. 177
         (2010).

         Vlad Vainberg, Comment, When Should Discovery Come
         With a Bill? Assessing Cost Shifting for Electronic
         Discovery, 158 U. PA. L. REV. 1523 (2010).

         Judge David J. Waxse, The Technology and Law of the
         Form of Production of Electronically Stored Information,
         49 JUDGES' J. 33 (2010).

         Laurie Weiss & Tom Barce, How Fulbright & Jaworski
         Transformed its Document Review Process, 28 LEGAL
         TECH. NEWSL., no. 5, 2010.

         Christopher Wilen, Defining Project Management for
         e-Discovery Success, 28 LEGAL TECH. NEWSL., no. 3, 2010.
         James Zinn & Kristin Zmrhal, Electronic Discovery in the
         Cloud, 28 LEGAL TECH. NEWSL., no. 5, 2010.

     2.4 Courtroom and Judges

         Mary E. Adkins, The Unblinking Eye Turns to Appellate
         Law: Cameras in Trial Courtrooms and Their Effect on
         Appellate Law, 15 J. TECH. L. & POL'Y 65 (2010).
         John G. Brownings, The Online Juror, 93 JUDICATURE 231
         (2010).

         Joseph L. Gerken, How Courts Use Wikipedia, 11 J. APP.
         PRAC. & PROCESS 191 (2010).

         Adriana C. Cervantes, Note, Will Twitter Be Following You
         in the Courtroom?: Why Reporters Should Be Allowed to
         Broadcast During Courtroom Proceedings, 33 HASTINGS
         COMM. & ENT. L.J. 133 (2010).

         Chris Davey & Karen Salaz, Survey Looks at New Media
         and the Court, 94 JUDICATURE 137 (2010).

         Judge Herbert B. Dixon Jr., Guarding Against the Dreaded
         Cyberspace Mistrial and Other Internet Trial Torpedoes,
         49 Judges' J. 37 (2010).

         Judge Herbert B. Dixon Jr., The Black Hole Effect: When
         Internet Use and Judicial Ethics Collide, 49 JUDGES' J. 38
         (2010).

         Judge Philip G. Espinosa, The Virtually Paperless Court of
         Appeals, 49 JUDGES' J. 10 (2010).

         Timothy J. Fallon, Note, Mistrial In 140 Characters Or
         Less? How The Internet And Social Networking Are
         Undermining The American Jury System And What Can Be
         Done To Fix It, 38 HOFSTRA L. REV. 935 (2010).

         Sheryl Jackson, Court-Provided Trial Technology:
         Efficiency and Fairness for Criminal Trials, 39 ANGLOAM.
         L. REV. 219 (2010).

         Ari Kaplan, Sharing Courtroom Insight and Legal Relays
         for Professional Success, 28 LEGAL TECH. NEWSL., no. 4,
         2010.

         G. Daniel Lassiter & Matthew J Lindberg, Video
         Recording Custodial Interrogations: Implications of
         Psychological Science for Policy and Practice, 38 J.
         PSYCHIATRY & L. 177 (2010).

         Laura Whiteney Lee, Silencing the "Twittering Juror":
         The Need to Modernize Pattern Cautionary Jury
         Instructions To Reflect The Realities Of The Electronic
         Age, 60 DEPAUL L. REV. 181 (2010).

         Judge William E. Smith, Judicial Opinions and the Digital
         Revolution, 49 JUDGES' J. 7 (2010).

     2.5 Dispute Resolution

         Chi Chi Wu, Automated injustice: How A Mechanized
         Dispute System Frustrates Consumers Seeking To Fix
         Errors In Their Credit Reports, 14 N.C. BANKING INST.
         139 (2010)

         R. Lisle Baker, My Tree Versus Your Solar Collector or
         Your Well Versus My Septic System ?--Exploring Responses
         to Beneficial but Conflicting Neighboring Uses of Land, 37
         B.C. ENVTL. AFF. L. REV. 1 (2010).

         Susan Nauss Exon, The Next Generation Of Online
         Dispute Resolution. The Significance Of Holography To
         Enhance And Transform Dispute Resolution, 12 CARDOZO
         J. CONFLICT RESOL. 19 (2010).

         Jennifer Sackin, Note, Online Dispute Resolution With
         China: Advantageous, But At What Cost?, 12 CARDOZO J.
         CONFLICT RESOL. 245 (2010).

3. COMPUTERS, TECHNOLOGY AND THE GOVERNMENT
     3.0 General

         Val Barrett, Releasing the Record of Parliamentary
         Proceedings: Identifying and Controlling the Risks,
         20 J. L. INFO & SCI. 98 (2010).

         Jennifer Chang, Note, Rated M for Mature: Violent Video
         Game Legislation and the Obscenity Standard, 24 ST.
         JOHN'S J.L. COMM. 697 (2010).

         H. Jin Cho, Article, Substantially Justified? The U.S.
         Government's Use of Name-Check Technologies In
         Naturalization Procedures, 2010 DUKE L. & TECH. REV. 7
        (2010).

         Ernest J. Hanson, Note, What Is a Component: Has
         Cardiac Pacemakers Put 35 U.S.C. [section] 271(f)'s
         Applicability to Process Patents on Life Support?,
         2010 U. ILL. J.L. TECH. & POL'Y 383 (2010).

         Daniel A. Lyons, Technology, Convergence and
         Federalism: Who Should Decide the Future of
         Telecommunications Regulation? 43 U. MICH. J.L.
         REFORM 383 (2010).

         Paul Ohm, The Argument Against Technology-Neutral
         Surveillance Laws, 88 TEX. L. REV. 1685 (2010).

3.1 Computers, Technology and Law Enforcement

         W. David Ball, E Pluribus Unum: Data and Operations
         Integration in the California Criminal Justice System, 21
         STAN. L. & POL'Y REV 277 (2010).

         Elizabeth Bowersox, Up in the Air: A New Framework for
         Laptop Searches in International Airports, 35 OKLA. CITY
         U.L. REV. 885, (2010).

         Jane C. Christie, Disconnected: The Safe Prisons
         Communications Act Fails to Address Prison
         Communications, 51 JURIMETRICS J. 17 (2010).

         Kevin Cowen, The Territorial System for Trademarks on
         the Internet: Our Only Real Choice, (Part Six: Trademarks
         and the Internet), 19 J. CONTEMP. LEGAL ISSUES 536
         (2010).

         Dean Dabney, Observations Regarding Key Operational
         Realities in a Compstat Model of Policing, 27 JUST. Q. 28
         (2010).

         Rachel Flipse, Comment, An Unbalanced Standard.
         Search and Seizure of Electronic Data Under the Border
         Search Doctrine, 12 U. PA. J. CONST. L. 851 (2010).

         James Forrest Mckell Jr., Article, Chatter, Clatter, And
         Blinks: Defective Car Alerts and the Role of Techological
         Advances in Design Defect/Failure to Warn Cases, 2010
         DUKE L. & TECH. REV. 10 (2010).

         Cameron W. Eubanks, Note, Laptops, Airports, and the
         Border: Expanding Technology and the Shrinking Fourth
         Amendment in United States v. Arnold, 64 U. MIAMI L.
         REV. 1117 (Apr. 2010).

         Matthew Gabriel et al., Beyond the Cold Hit: Measuring
         the Impact of the National DNA Data Bank on Public
         Safety at the City and County Level, 38 J.L. MED. &
         ETHICS 396 (2010).

         Luis Garicano & Paul Heaton, Information Technology,
         Organization, and Productivity in the Public Sector:
         Evidence from Police Departments, 28 J. LABOR ECON.
         167 (2010).

         David A. Harris, Picture This: Body-Worn Video Devices
         (Head Cams) as Tolls for Ensuring Fourth Amendment
         Compliance by Police, 43 TEX. TECH L. REV. 357 (2010).

         Adam Koppel, Note, Warranting a Warrant: Fourth
         Amendment Concerns Raised by Law Enforcement's
         WARRANTLESS USE OF GPS AND CELLULAR PHONE
         TRACKING, 64 U. MIAMI L. REV. 1061 (2010).

         Alex R. Hess, Note, Herring V. United States: Are Errors
         in Government Databases Preventing Defendants from
         Receiving Fair Trials?, 11 J. HIGH TECH. L. 129 (2010).

         Jessica LoConte, Fisa Amendments Act 2008: Protecting
         Americans By Monitoring International Communications;
         Is It Reasonable?, 22 PACE INT'L. L. REV. ONLINE
         COMPANION 6, (2010).

         Christopher E. Lentz, A State's Duty to Prevent and
         Respond to Cyberterrorist Acts', 10 CHI. J. INT'L L. 799
         (2010).

         Tension Between Privacy and Law Enforcement on the
         Web, 2010 PGH. J. TECH. L. & POL'Y 1, (2010).

         Katharine M. O'Connor, Note, :o OMG They Searched My
         TXTS: Unraveling the Search and Seizure of Text
         Messages, 2010 U. ILL. L. REV. 685 (2010).

         Kathlyn Querubin, Note, Cutting the Fourth Amendment
         Loose from Its Moorings: The Unconstitutional Use of
         FISA Evidence in Ordinary Criminal Prosecutions, 37
         HASTINGS CONST. L.Q. 371 (2010).

         Frederick Schauer, Can Bad Science Be Good Evidence?
         Neuroscience, Lie Detection, And Beyond, 95 CORNELL L.
         REV. 1191 (2010).

         Dylan M. Spaduzzi, Note, Publicity Enemy Number One:
         Federal Immunity for a Virtual World, 40 U. MEM. L. REV.
         603 (2010).

         Thomas P. Sullivan, The Evolution of Law Enforcement
         Attitudes to Recording Custodial Interviews, 38 J.
         PSYCHIATRY & L. 137 (2010).

         Ju-Hyun Yoo, Note, The Science of Identifying People by
         Their DNA, A Powerful Tool for Solving Crimes, Including
         Cold Cases From the Civil Rights Era, 2010 SYRACUSE
         SCI. & TECH. L. REP. 53 (2010).

     3.2 Use of Computers and Technology by the Military

         Matthew D. Burris, Tilting at the Windmills? The
         Counterposing Policy Interests Driving the U.S.
         Commercial Satellite Export Control Reform Debate, 66
         A.F.L. REV. 255 (2010).

         Troy A. Rule, Shadows on the Cathedral: Solar Access
         Laws in a Different Light, 2010 U. ILL. L. REV. 851 (2010).

     3.3 Use of Computers and Technology by State and
         Federal Legislatures

         Jordan Segall, Google Street View: Walking the Line of
         Privacy- Intrusion upon Seclusion and Publicity Given to
         Private Facts in the Digital Age, 10 PGH. J. TECH. L. &
         POL'Y 1 (2010).

         Elaine Vullmahn, Comment, Firearm Transaction
         Disclosure in the Digital Age. Should the Government
         Know What Is In Your Home?, 27 J. MARSHALL J.
         COMPUTER & INFO. L. 497 (2010).

     3.4 Regulation of Computers and Technology

         Terri Day & Ryan Hall, Deja Vu: From Comic Books to
         Video Games: Legislative Reliance on "Soft Science" to
         Protect Against Uncertain Societal Harm Linked to
         Violence v. the First Amendment, 89 OR. L. REV. 415
         (2010).

         Amy W. Estrada, Note, Saving Face from Facebook:
         Arriving at a Compromise between Schools' Concerns with
         Teacher Social Networking and Teachers' First
         Amendment Rights, 32 T. JEFFERSON L. REV. 283 (2010).

         Bennett L. Gershman, Privacy Revisited: GPS Tracking as
         Search and Seizure Getwhman, 30 PACE L. REV. 927
         (2010).

         Matthew Junker, WikiLeaks: The First Amendment and
         National Security on a Collision Course, 2010 PGH. J.
         TECH. L. & POL'Y 167, (2010).

         Sarah Kagan, Note, Obscenity on the Internet:
         Nationalizing the Standard to Protect Individual Rights, 38
         HASTINGS CONST. L.Q. 233 (2010).

         Dominic E. Markwordt, Media And The Law Symposium:
         When Does Government Regulation Go Too Far?: More
         Folly Than Fairness: The Fairness Doctrine, The First
         Amendment, And The Internet Age, 22 REGENT U.L. REV.
         405, (2009/2010).

         Namkee Park & Kwan Min Lee, Wireless Cities: Local
         Governments: Involvement in the Shaping of Wi-Fi
         Networks, 54 J. BROAD. & ELEC. MEDIA 425 (2010).

         Jordan Segall, The FCC's Loss in the D.C. Circuit- A
         Setback for Internet Providers and Equal Internet
         Access, 2010 PGH. J. TECH. L. & POL'Y 1 (2010).

         Christopher Witteman, Constitutionalizing
         Communications: The German Constitutional Court's
         Jurisprudence of Communications Freedom, 33 HASTINGS
         INT'L & COMP. E. REV. 95 (2010).

     3.4.0 General

         Jillian Bluestone, Comment, La Russa's Loophole:
         Trademark Infringement Lawsuits and Social
         Networks, 17 VILL. SPORTS & ENT. L.J. 573 (2010).

         Susan W. Brenner & Leo L. Clarke, Civilians in
         Cyberwarfare: Conscripts, 43 VAND. J. TRANSNAT'L
         L. 1011 (2010).

         Charles P. Ciaccio, Jr., Internet Gambling: Recent
         Developments and State of the Law, 25 BERKELEY
         TECH. L.J. 529 (2010).

         Ariella Mutchler, Note, CAN-SPAM Versus the
         European Union E-Privacy Directive: Does Either
         Provide a Solution to the Problem of Spare?, 43
         SUFFOLK U. L. REV. 957 (2010).

         Jordan J. Paust, Self-Defense Targetings of Non-State
         Actors And Permissibility of U.S. Use of Drones in
         Pakistan, 19 J. TRANSNAT'L L. & POL'Y 237 (2010).

         Thomas E. Sherzan, Note, "Talk 2 U L8r"--Why
         Cell Phones and Driving Have "G2g": An Analysis
         Of The Dangers Of Cell Phone Use While Driving,
         59 DRAKE L. REV. 217 (2010).

         Sarabeth A. Smith, Note, What's Old is New Again:
         Terrorism and the Growing Need to Revisit the
         Prohibition on Propaganda, 37 SYRACUSE J. INT'L
         L. & COM. 299 (2010).

     3.4.1 First Amendment Concerns

         James Banks, Regulating Hate Speech Online, 24
         INT'L REV. LAW, COMP. & TECH. 233 (2010).

         Carolyn Joyce Mattus, Is it Really My Space? Public
         Schools and Student Speech on the Internet after
         Layshock v. Hermitage School District and Snyder v.
         Blue Mountain School District, 16 B.U.J. SCI. &
         TECH. L. 318 (2010).

         Jeffrey D. Kramer, Note, Seafaring Data Havens:
         Google's Patented Pirate Ship, 2010 U. ILL. J.L.
         TECH. & POL'Y 359 (2010).

         Stephanie Klupinski, Note, Getting Past the
         Schoolhouse Gate: Rethinking Student Speech in the
         Digital Age, 71 OHIO ST. L.J. 611 (2010).

         Matthew I. Schiffhauer, Note, Uncertainty at the
         "Outer Boundaries" of the First Amendment:

         Extending the Arm of School Authority Beyond the
         Schoolhouse Gate into Cyberspace, 24 ST. JOHN'S
         J.L. COMM. 731 (2010).

     3.4.2 Antitrust

         Willow Noonan, Conament, Antitrust, Intellectual
         Property, and the Itunes Ecosystem: A Study of the
         Antitrust Implications of Apple's Fairplay
         Technology. with A Nod to the Peculiarities of
         Intellectual Property, 50 IDEA 533 (2010).

         Dean V. Williamson, Antitrust, Innovation, and
         Uncertain Property Rights: Some Practical
         Considerations, 2010 DUKE L. & TECH. REV. 1
         (2010).

     3.4.3 FCC Regulation

         LaVonda N. Reed-Huff, Political Advertisements in
         the Era of Fleeting Indecent Images and Utterances,
         84 ST. JOHN'S L. REV. 199 (2010).

     3.4.4 SEC Regulation

4. ISSUES OF PRIVACY, SECURITY AND CRIME
     4.0 General

         Mario Viola de Azevedo Cunha, Privacy, Security and
         the Council Framework Decision 2008/977/JHA, 43
         L./TECH., no. 4, 2010, 1.

         Susan Nauss Exon, Next Generation of Online Dispute
         Resolution: The Significance of Holography to Enhance
         and Transform Dispute Resolution, 12 CARDOZO J.
         CONFLICT RESOL. 19 (2010).

         Elizabeth Blanks Hindman, Protecting Childhood:
         Rights, Social Goals And The First Amendment In The
         Context Of The Child Online Protection Act, 15 COMM.
         L. & POL'Y 1 (2010).

         Mark L. Mayakis, Comment, Cell Phone--A "Weapon"
         of Mass Discretion, 33 CAMPBELL L. REV. 151 (2010).

         Abhilash Nair, Real Porn and Pseudo Porn: The
         Regulatory Road, 24 INT'L REV. LAW, COMP. & TECH.
         223 (2010).

         W. Michael Ryan & Christopher M. Loeffle, Insights
         into Cloud Computing, 22 INTELL. PROP. & TECH. L. J.
         22 (2010).

         Tim Wafa, How the Lack of Prescriptive Technical
         Granularity in HIPAA Has Compromised Patient
         Privacy, 30 N. ILL. U. L. REV. 531 (2010).

         Faye Fangfei Wang, Culture and trust in privacy
         information protection, 24 INT'L REV. LAW, COMP. &
         TECH. 143 (2010).

         Nicholas D. Wells et al., Information Services,
         Technology, and Data Protection, 44 INT'L LAW. 355
         (2010).

     4.1 Problems of Privacy

         Juan A. Albino, Do Defendants Have A Privacy Interest In
         Their Cell Phone's Text Messages And E-Mails?, 44 REV.
         JUR. U.I.P.R. 383 (2009/2010).

         Adrian Bannon, Romania Retrenches On Data Retention,
        24 INT'L REV. LAW, COMP. & TECH. 145 (2010).

         Charlotte Chang, Internet Safety Survey: Who Will Protect
         the Children?, 25 BERKELEY TECH. L.J. 501 (2010).

         Chung-Lin Chen, In Search of a New Approach of
         Information Privacy Judicial Review: Interpretation No.

         603 of Taiwan's Constitutional Court as a Guide, 20 IND.
         INT'L & COMP. L. REV. 21 (2010).

         Rachel Flipse, Comment, An Unbalanced Standard:
         Search and Seizure of Electronic Data Under the Border
         Search Doctrine, U. PA. J. CONST. L. (2010).

         Lisa Graves, The Right to Privacy in Light of Presidents'
         Programs: What Project MINARET's Admissions Reveal
         about Modern Surveillance of Americans, 88 TEX. L. REV.
         1855 (2010).

         Sondra Levine, The Lanham Act's Role in the Chase after
         Cybersquatters, (Part Six: Trademarks and the Internet) 19
         J. CONTEMP. LEGAL ISSUES 513 (2010).

         Jaqueline D. Lipton, "We, the Paparazzi": Developing a
         Privacy Paradigm for Digital Video, 95 IOWA L. REV. 919
         (2010).

         Sarah Salter, Storage and Privacy in the Cloud: Enduring
         Access to Ephemeral Messages, 32 HASTINGS COMM. &
         ENT. L.J. 365 (2010).

         Mary Ann Scholl, Comment, GPS Monitoring May Cause
         Orwell To Turn in His Grave, But Will It Escape
         Constitutional Challenges? A Look At GPS Monitoring Of
         Domestic Violence Offenders In Illinois, 43 J. MARSHALL
         L. REV. 845 (2010).

         Konstantinos K. Stylianou, An Evolutionary Study of Cloud
         Computing Service Privacy Terms, 27 J. MARSHALL J.
        COMPUTER & INFO. L. 593 (2010).

     4.1.0 General

         Adetayo Adeyiga, Wait ... Can This Be Used Against
         Me?--As Facebook's Popularity Continues to
         Increase, So Does Its Privacy Issues, 2010 PGH. J.
         Tech. L. & Pol'y 1, (2010).

         Katie Angliss, "Do Not Track" Feature: Microsoft's
         Response to Ongoing Privacy Concerns, 2010 PGH.
         J. Tech. L. & Pol'y 176, (2010).

         Merritt Baer, Cyberstalking and the Internet
         Landscape We Have Constructed, 15 VA. J.L. &
         TECH. 153 (2010,).

         Mark Burdon, Privacy Invasive Geo-Mashups:
         Privacy 2.0 and the Limits of First Generation
         Information Privacy Laws, 2010 U. ILL. J.L. TECH. &
         POL'Y 1 (2010).

         Clay Calver, Dying For Privacy: Pitting Public
         Access Against Familial Interests in the Era of the
         Internet, 105 NW. U. L. REV. COLLOQUY 18 (2010).

         Carolyn G. Coda, Commentary, The Battle Between
         Privacy and Policy in Quon v. City of Ontario:
         Employee Privacy Rights and the Operational
         Realities of the Workplace on Display at the Supreme
         Court, 19 COMMLAW CONSPECTUS 211 (2010).

         Katherine Drakiak-Syed, Baby Gender Mentor:
         Class Action Litigation Calls Attention to a Deficient
         Federal Regulatory Framework for DTC Genetic
         Tests Politicized State Statutory Construction, and a
         Lack of Informed Consent, 14 MICH. ST. J. MED. &
         LAW 71 (2010).

         Joshua J. Dubbelde, Note, A Potentially Fatal Cure:
         Does Digital Rights Management Ensure Balanced
         Protection of Property Rights?, 2010 U. ILL. J.L.
         TECH. & POL'Y 409 (2010).

         Joshua A. Engel, Doctrinal Collapse: Smart Phones
         Cause Courts to Reconsider Fourth Amendment
         Searches of Electronic Devices, 41 U. MEM. L. REV.
         233 (2010).

         Nicole Flaherty, New Airport Passenger Screening
         Techniques: An Invasion of Privacy or a Necessary
         Change?, 2010 PGH. J. TECH. L. & POL'Y 1, (2010).

         Lindsey Gil, Bad Intent or Just a Bad Day? Fourth
         Amendment Implications Raised by Technological
         Advances in Security Screening, 16 B.U.J. SCI. &
         TECH. L. 231 (2010).

         Melissa M. Goldstein, Health Information
         Technology and the Idea of Informed Consent, 38
         J.L. MED. & ETHICS 27 (2010).

         Stephen Hoffman, Biometrics, Retinal Scanning, and
         the Right to Privacy in the 21st Century, SYRACUSE
         Sci. & TECH. L. REP. 38 (2010).

         Kathleen E. Kubis, Note, Google Books: Page by
         Page, Click by Click, Users Are Reading Away
         Privacy Rights, 13 VAND. J. ENT. & TECH. L. 217
         (2010).

         David Lyon, National 1Ds in a Global World:
         Surveillance, Security, and Citizenship, 42 CASE W.
         RES. J. INT'L L. 607 (2010).

         Mike McNemey, Warshak: a Test Case for the
         Intersection of Law Enforcement and Cyber Security,
         2010 U. ILL. J.L. TECH. & POL'Y 345 (2010).

         Jana McGowen, Comment, Your Boring Life, Now
         Available Online: Analyzing Google Street View and
         the Right to Privacy, 16 TEX. WESLEYAN L. REV.
         477 (2010).

         Laura W. Morgan & Lewis B. Reich, The
         Individual's Right Of Privacy In A Marriage, 23 J.
         AM. ACAD. MATRIM. LAW. 111 (2010).

         Gerald O'Hara, Commentary, Cyber-Espionage: A
         Growing Threat to the American Economy, 19
         COMMLAW CONSPECTUS 241 (2010).

         David Orentlicher, Prescription Data Mining and the
         Protection of Patients' Interests, 38 J.L. MED. &
         ETHICS 74 (2010).

         Elisabeth Pride, Down The Rabbit's Hole: Baby
         Monitors, Family Movies And Wiretap Law, 23 J.
         AM. ACAD. MATRIM. LAW. 131 (2010).

         Jordan E. Segall, Google Street View: Walking the
         Line of Privacy- Intrusion upon Seclusion and
         Publicity Given to Private Facts in the Digital
         Age. 10 PGH. J. TECH. L. & POL'Y 1 (2010).

         Robert N. Strassfeld & Cheryl Ough, Somebody's
         Watching Me: Surveillance and Privacy in an Age of
         National Insecurity, 42 CASE W. RES. J. INT'L L. 543
         (2010).

         Micheal Vonn, CCTV and the 2010 Vancouver
         Games: Spatial Tactics and Political Strategies, 42
         CASE W. RES. J. INT'L L. 595 (2010).

         Aileen B. Xenakis, Washington and CCTV: It's
         2010, Not Nineteen Eighty-Four, 42 CASE W. RES. J.
         INT'L L. 573 (2010).

     4.1.1 Data Privacy

         Emily Bayer-Pacht, Note, The Computerization Of
         Land Records: How Advances In Recording Systems
         Affect The Rationale Behind Some Existing Chain Of
         Title Doctrine, 32 CARDOZO L. REV. 337 (2010).

         Kevin L. Doran, Privacy and Smart Grid: When
         Progress and Privacy Collide, 41 U. TOL. L. REV.
         909 (2010).

         Gus Hosein, Returning To A Principled Basis For
         Data Protection, 84 CHL-KENT L. REV. 803 (2010).

         Philip Howard & Kris Erickson, Data Collection And
         Leakage, 84 CHI.-KENT L. REV. 737 (2010).

         Laura Huey, A Social Movement for Privacy/Against
         Surveillance? Some Difficulties in Engendering Mass
         Resistance in a Land of Twitter and Tweets, 42 CASE
         W. RES J. INT'L L. 699 (2010).

         Orin S. Kerr, Applying the Fourth Amendment to the
         Internet: A General Approach, 62 STAN. L. REV.
         1005 (2010).

         Jana Knott, Is There an App for That? Reexamining
         the Doctrine of Search Incident to Lawful Arrest in
         the Context of Cell Phones, 35 OKLA. CITY U.L.
         REV. 445 (2010).

         Jacqueline D. Lipton, Digital Multi-Media and the
         Limits of Privacy Law, 42 CASE W. RES. J. INT'L L.
         551 (2010).

         Toon Moonen, Special Investigation Techniques,
         Data Processing And Privacy Protection In The
         Jurisprudence Of The European Court Of Human
         Rights, 22 PACE INT'L. L. REV. ONLINE COMPANION
         97 (2010).

         Scott Ness, The Anonymous Poster: How to Protect
         Internet Users' Privacy And Prevent Abuse, 2010
         DUKE L. & TECH. REV. 8 (2010).

         Jeff Nigriny & Randy V. Sabett, The Third-Party
         Assurance Model: A Legal Framework for Federated
         Identity Management, 50 JURIMETRICS J. 509 (2010).

         Greg Pollaro, Article, Disloyal Computer Use and
         The Computer Fraud and Abuse Act: Narrowing The
         Scope, 2010 DUKE L. & TECH. REV. 12 (2010).

         Steven B. Roosa & Stephen Schultze, The
         "Certificate Authority" Trust Model for SSL: A
         Defective Foundation for Encrypted Web Traffic and
         a Legal Quagmir, 22 INTELL. PROP. & TECH. L. J. 3
         (2010).

         Erin Marie Secord, Note, Exploring Challenges with
         the Discovery of Text Messages in Federal Cases
         through the Lens of the Federal Rules of Civil
         Procedure and the Stored Communications Act, 15
         SUFFOLK J. TRIAL & APP. ADV. 143 (2010).

         Raymond Shih Ray Ku, Unlimited Power. Why the
         President's (Warrantless) Surveillance Program Is
         Unconstitutional, 42 CASE W. RES. J. INT'L L. 647
         (2010).

         Peter K. Yu, The Political Economy OF Data
         Protection, 84 CHI.-KENT L. REV. 777 (2010).

     4.1.2 Privacy in the Workplace

         Cheryl Cooper, Note, Sending the Wrong Message:
         Technology, Sunshine Law, and the Public Record in
         Florida, 39 STETSON L. REV. 411 (2010).

         Nicola Lugaresi, Electronic Privacy in the
         Workplace: Transparency and responsibility, 24
         INT'L REV. LAW, COMP. & TECH. 163 (2010).

         Jana M. Luttenegger, Note, Smartphones: Increasing
         Productivity, Creating Overtime Liability, 36 IOWA
         J. CORP. L. 259 (2010).

         Emerging Technology and Client Confidentiality:
         How Changing Technology Brings Ethic Dilemnas,
         16 B.U.J. SCI. & TECH. L. 1 (2010).

         Alexander J. Yoakum, Comment, Technical
         Problem: How City of Dallas v. Dallas Morning
         News, LP Exposed a Major Loophole in the Texas
         Public Information Act, 42 ST. MARY'S L. J. 297
         (2010).

4.2 Security
     4.2.0 General

         Alexander W. Joel, Choosing Both: Making
         Technology Choices at the Intersections of Privacy
         and Security, 88 TEX. L. REV. 1751 (2010).

         Abraham Shaw, Data Breach: From Notification to
         Prevention Using PCI DSS, 43 COLUM. J.L. & SOC.
         PROBS. 517 (2010).

     4.2.1 Cyberwar

         William C. Banks & Elizabeth Rindskopf Parker,
         Cybersecurity Symposium: National Leadership,
         Individual Responsibility: Introduction, 4 J. NAT'L
         SECURITY L. & POL'Y 7 (2010).

         Mathew Borton et al., Cyberwar Policy, 27 J.
         MARSHAL J. COMPUTER & INFO. L. 303 (2010).

         Steven R. Chabinsky, Cybersecurity Symposium:
         National Leadership, Individual Responsibility:
         Cybersecurity Strategy: A Primer for Policy Makers
         and Those on the Front Line, 4 J. NAT'L SECURITY
         L. & POL'Y 27 (2010).

         Michael Chertoft; Cybersecurity Symposium.
         National Leadership, Individual Responsibility:
         Foreword, 4 J. NAT'L SECURITY L. & POL'Y 1
         (2010).

         Gus P. Coldebella & Brian M. White, Cybersecurity
         Symposium: National Leadership, Individual
         Responsibility: Foundational Questions Regarding
         the Federal Role in Cybersecurity, 4 J. NAT'L
         SECURITY L. & POL'Y 233 (2010).

         Stephen Dycus, Cybersecurity Symposium: National
         Leadership, Individual Responsibility: Congress's
         Role in Cyber Warfare, 4 J. NAT'L SECURITY L. &
         POL'Y 155 (2010).

         David E. Graham, Cybersecurity, Symposium:
         National Leadership, Individual Responsibility:
         Cyber Threats and the Law of War, 4 J. NAT'L
         SECURITY L. & POL'Y 87 (2010).

         Derek Hines, Issues in the Third Circuit: Should
         Using Facebook at Work Be a Federal Crime?: The
         Third Circuit Applies Honest Services Fraud to
         Private Individuals in United States v. McGeehan,
         55 VILL. L. REV. 1007 (2010).

         Jeffrey Hunker, Cybersecurity Symposium: National
         Leadership, Individual Responsibility: U.S.
         International Policy for Cybersecurity: Five Issues
         That Won't Go Away, 4 J. NAT'L SECURITY L. &
         POL'Y 197 (2010).

         Eric Talbot Jensen, Cyber Warfare and Precautions
         against the Effects of Attacks,
         88 TEX. L. REV. 1533 (2010).

         Sean Kanuck, Sovereign Discourse on Cyber
         Conflict Under International Law, 88 TEX. L. REV.
         1571 (2010).

         Herbert S. Lin, Cybersecurity Symposium: National
         Leadership, Individual Responsibility: Offensive
         Cyber Operations and the Use of Force, 4 J. NAT'L
         SECURITY L. & POL'Y 63 (2010).

         Gregory T. Nojeim, Cybersecurity Symposium:
         National Leadership, Individual Responsibility:
         Cybersecurity and Freedom on the Internet, 4 J.
         NAT'L SECURITY L. & POL'Y 119 (2010).

         Walter Gary Sharp, Sr., Cybersecurity Symposium:
         National Leadership, Individual Responsibility: The
         Past, Present, and Future of Cybersecurity, 4 J.
         NAT'L SECURITY L. & POL'Y 13 (2010).

         Yasuhide Yamada et al., Cybersecurity Symposium:
         National Leadership, Individual Responsibility: A
         Comparative Study of the Information Security
         Policies of Japan and the United States, 4 J. NAT'L
         SECURITY L. & POL'Y 217 (2010).

         Mark D. Young, Cybersecurity Symposium: National
         Leadership, Individual Responsibility: National
         Cyber Doctrine: The Missing Link in the Application
         of American Cyber Power, 4 J. NAT'L SECURITY L. &
         POL'Y 173 (2010).

     4.2.2 Encryption and Digital Signatures

4.3 Crime
     4.3.0 General

         Thomas K. Clancy, Digital Child Pornography and
         the Fourth Amendment, 49 JUDGES' J. 26 (2010).

         Clay Calvert & Jerry Bruno, When Cleansing
         Criminal History Clashes With the First Amendment
         and Online Journalism. Are Expungement Statutes
         Irrelevant in the Digital Age?, 19 COMMLAW
         CONSPECTUS 123 (2010).

         Molly Eichten, The Computer Fraud and Abuse
         Act--A Survey of Recent Cases, 66 BUS. LAW. 231
         (2010).

         Cynthia Fraser et al., New Age of Stalking:
         Technological Implications for Stalking, 61 JUV. &
         FAM. CT. J. (SPECIAL ISSUE--FAMILY VIOLENCE) 39
         (2010).

         Erin I. Kunze, Note, Sex Trafficking via the Internet:
         How International Agreements Address the Problem
         and Fail to Go Far Enough, 10 J. HIGH TECH. L. 241
         (2010).

         Benjamin A. Mains, Note, Virtual Child
         Pornography, Pandering, and the First Amendment:
         How Developments in Technology and Shifting First
         Amendment Jurisprudence Have Affected the
         Criminalization of Child Pornography, 37 HASTINGS
         CONST. L.Q. 809 (2010).

         Jessica L. McCurdy, Computer Crimes, 47 AM.
         CRIM. L. REV. 287 (2010).

         Paul Rosenzweig, Privacy and Counter-Terrorism:
         The Pervasiveness of Data, 42 CASE W. RES. J. INT'L
         L. 625 (2010).

         Joel M. Schumm, Criminal Law and Procedure:
         Recent Developments in Indiana Criminal Law and
         Procedure, 43 IND. L. REV. 691 (2010).

         Michael R. Ward, Video Games and Adolescent
         Fighting, 53 J. L. & ECON. 611 (2010).

     4.3.1 Internet

         Jonathan Bishop, Tough on data misuse, tough on the
         causes of data misuse: A review of New Labour's
         approach to information security and regulating the
         misuse of digital information (1997-2010), 24 INT'L
         REV. LAW, COMP. & TECH. 299 (2010).

         T. Luis de Guzman, Note, Unleashing A Cure For
         The Botnet Zombie Plague: Cybertorts,
         Counterstrikes, And Privileges, 59 CATH. U.L. REV.
         527 (2010).

         Salil K. Mehra, Law and Cybercrime in the United
         States Today, 58 AM. J. COMP. L. 659 (2010).

         David Pendle, Feature New York V. Kent: Using
         Temporary Internet Files to Prove Possession of
         Child Pornography, PROSECUTOR, Dec. 2010, at 12.

5. COMPUTERS, TECHNOLOGY AND EDUCATION
     5.0 General

         Joanna L. Barry, Note, The Child as Victim and
         Perpetrator: Laws Punishing Juvenile "Sexting", 13
         VAND. J. ENT. & TECH. L. 129 (2010).

         Adam Dauksas, Comment, Doniniger's Wedge: Has
         Avery Doninger Bridged the Way for Internet Versions of
         Mathew Fraser?, 43 J. MARSHALL L. REV. 439 (2010).

         Christina Ehret, Availability of Legal Documents to the
         Public, 2010 PGH. J. TECH. L. & POL'Y 1, (2010).

         Elizabeth M. Ryan, Sexting: How the State Can Prevent a
         Moment of Indiscretion from Leading to a Lifetime of
         Unintended Consequences for Minors and Young Adults,
         96 IOWA L.REV. 357 2010).

         Paul Todd, Plagiarism Detection Software: Legal and
         Pedagogical Issues, 44 THE L. TCHR. 137 (2010).

     5.1 Legal Education

         Pauline Collins, Inclusive Team Assessment of Off-Campus
         and On-Campus First Year Law Students using
         Instantaneous Communication Technology, 44 THE L.
         TCHR. 309 (2010).

         Sarah Field & Lucy Jones, Innovations in Assessment: An
         Investigation into the Role of Blended Learning as a
         Support Mechanism for Assessment, 44 THE L. TCHR.
         (SPECIAL ISSUE) 378 (2010).

         Andrew Hemming, Online Tests and Exams: Lower
         Standards or Improved Learning? 44 THE L. TCHR. 283
         (2010).

         Ian McCall, Online Enhanced Problem-Based Learning.
         Assessing a Blended Learning Framework, 44 THE L.
         TCHR. 42 (2010).

         Michael L. Perlin, An Internet-Based Mental Disability
         Law Program. Implications for Social Change in Nations
         with Developing Economies, 43 L./TECH., no. 1, 2010, 20.

         Dawn Watkins, Podcasting: A Lawyer's Tale, 44 THE L.
         TCHR. 169 (2010).

6. COMPUTERS, TECHNOLOGY AND BUSINESS
     6.0 General

         Anthony Cabot, Betting on the Budget: Can State
         Legislatures Go All in or Will the Federal Government
         Force Them to Fold?: The Absence of a Comprehensive
         Federal Policy Toward Internet and Sports Wagering and
         a Proposal for Change, 17 VILL. SPORTS & ENT. L.J. 271
         (2010).

         David Gevertz and Gina Greenwood, Crafting an Effective
         Social Media Policy for Healthcare Employees, 22
         HEALTH LAW. 28 (2010).

         Ronald J. Gilson, Locating Innovation: The Endogeneity of
         Technology, Organizational Structure, and Financial
         Contracting, 110 COLUM. L. REV. 885 (2010).

         Simon Fodden, The Less-Than-Ideal State of Web 2.0 in
         Law schools and How to Improve It, LAW PRAC.,
         Sept./Oct. 2010, 22.

         Jeff Karberg, Note, Progress in the Challenge to Regulate
         Online Pharmacies, 23 J.L. & HEALTH 113 (2010).

         Molly C. Novy, Note, Privacy at a Price:
         Direct-to-Consumer
         Genetic Testing & the Need for Regulation,
         2010 U. ILL. J.L. TECH. & POL'Y 157 (2010).

         Christine Neylon O'Brien, Employer E-Mail Policies and
         The National Labor Relations Act: D.C. Circuit Bounces
         Register-Guard Back to the Board on Discriminatory
         Enforcement Issues, 61 LAB. L.J. 5 (2010).

         Daniel S. Park, The Associated Press v. All Headline News:
         How Hot News Misappropriation Will Shape the Unsettled
         Customary Practices of Online Journalism, 25 BERKELEY
         TECH. L.J. 369 (2010).

         Ann Riley, Google is Changing the Way We Use the
         Internet. But is the Growth of all things "G-" Actually
         Taking Over and Going too Far?, 2010 PGH. J. TECH. L. &
         POL'Y 1 (2010).

         Brandon Sipherd & Christopher Volpe, Note, Evaluating
         The Legality Of Employer Surveillance Under The Family
         And Medical Leave Act: Have Employers Crossed The
         Line?, 27 HOFSTRA LAB. & EMP. L.J. 467 (2010).

         Eric Steiger, Note, Current Federal Regulation of Online
         Pharmacies Provides Much Needed Progress but Must Be
         Improved to Ensure Adequate Protection, 23 J.L. &
         HEALTH 143 (2010).

6.1 Electronic Commerce
     6.1.0 General

         Neil A. Beekman, Virtual Assets, Real Tax: The
         Capital Gains/Ordinary Income Distinction In
         Virtual Worlds, 11 COLUM. SCI. & TECH. L. REV.
         152 (2010).

         Christy Burke, Could the BP Oil Spill Lead to e-Discovery
         Disaster, 43 L./TECH., no. 2, 2010, 13.

         Kristin Kemnitzer, Beyond Rescuecom v. Google:
         The Future of Keyword Advertising, 25 BERKELEY
         TECH. L.J. 401 (2010).

         Todd E. Lerner, Playing The Blame Game, Online:
         Who Is Liable When Counterfeit Goods' Are Sold
         Through Online Auction Houses?, 22 PACE INT'L L.
         REV. 241 (2010).

         Robert Sprague & Mary Ellen Wells, Regulating
         Online Buzz Marketing: Untangling a Web of Deceit,
         47 AM. BUS. L.J. 415 (2010).

     6.1.1 Taxation

         Daniel Tyler Cowan, Recent Development: New
         York's Unconsitutional Tax on the Internet:
         Amazon.com v. New York State Department of
         Taxation & Finance and the Dormant Commerce
         Clause, 88 N.C.L. REV. 1423 (2010).

         Zelda Ferguson, Note, Is the Tax Holiday Over for
         Online Sales?, 63 TAX LAW. 1279 (2010).

         Ilya A. Lipin, A Practitioner's Guide to the Taxation
         of Telecommuting, 2-10 T.T.A. 100 (2010).

         Oleksandr Pastukhov, Will Internet Businesses Ever
         Become Interested in Complying with Tax Laws?, 22
         INTELL. PROP. & TECH. L. J. 10 (2010).

         Blaise M. Sonnier, An Analysis of Colorado's Notice
         and Reporting Requirements for Internet and Remote
         Sales, 28 J. ST. TAX'N 23 (2010).

6.2 Computers in Banking and Finance
     6.2.0 General

         Committee on Corporate Laws, Changes in the
         Model Business Corporation Act--Amendments to
         Incorporate Electronic Technology Amendments in
         Section 141 and to Adopt Related Amendments, 65
         BUS. LAW. 885 (2010).

         John R. Crook, European Union Approves Interim
         Agreement Allowing Limited U.S. Access to SWIFT
         Data, 104 AM. J. INT'L L. 107 (2010).

         Robert T. Denny, Note, Beyond Mere Theft: Why
         Computer Hackers Trading on Wrongfully Acquired
         Information Should Be Held Accountable Under the
         Securities Exchange Act. 2010 UTAH L. REV. 963
         (2010).

         Michael J. McGowan, Article, The Rise Of
         Computerized High Frequency Trading: Use And
         Controversy, 2010 DUKE L. & TECH. REV. 16 (2010).

         Shahrzad T. Radbod, Craigslist--A Case for
         Criminal Liability for Online Service Providers?, 25
         BERKELEY TECH. L.J. 597 (2010).

         David M. Serritella, Recent Development: High
         Speed Trading Begets High Speed Regulation: SEC
         Response to Flash Crash, Rash, 2010 U. ILL. J.L.
         TECH. & POL'Y 433 (2010).

         6.2.1 On-line Securities Trading

     6.3 Computers and Technology in the Transportation
          Industry

         Justin T. Barkowski, Managing Air Traffic Congestion
         Through the Next Generation Air Transportation System:
         Satellite-Based Technology, Trajectories,
         and--Privatization?, 37 PEPP. L. REV. 247 (2010).

         Aubrey B. Colvard, Comment, Trying to Squeeze Into the
         Middle Seat: Application of the Deregulation Act's
         Preemption Provision to Internet Travel Agencies, 75 J.
         AIR L. & COM. 705 (2010).

         Nicholas Gaskell, Bills of Lading in an Electronic Age,
         2010 LLOYD'S MAR. & COM. L. Q. 233 (2010).

         Katie McNelis, Toyota's Recall: Genuine Cause for
         Concern, or Media Feeding-Frenzy?, 2010 PGH. J. TECH.
         L. & POL'Y 1 (2010).

    6.4 Computers and Technology in the Publishing Industry

         Sharon Docter, Blogging and Journalism: Extending Shield
         Law Protection to New Media Forms, 54 J. BROAD. &
         ELEC. MEDIA 588 (2010).

         Teresa Scassa, Journalistic Purposes and Private Sector
         Data Protection Legislation: Blogs, Tweets And
         Information Maps, 35 QUEEN'S L.J. 733 (2010).

     6.5 Computers and Technology in Advertising

         Slade Bond, Doctor Zuckerberg: or, How I Learned to
         Stop Worrying and Love Behavioral Advertising, 20 KAN.
         J.L. & PUB. POL'Y 129 (2010).

     6.6 Computers and Technology in Accounting

         Tom Prieto, Column, Tax Practice Corner: Online Selling
         and New Third Party Network Reporting, 10-2010 J.A. 70
         (2010).

7. INTELLECTUAL PROPERTY PROTECTION OF COMPUTERS
     AND TECHNOLOGY
     7.0 General

         Kristin L. Black, Crimes of Fashion: Is Imitation Truly
         the Sincerest Form of Flattery? 19 KAN. J.L. & PUB. POL'Y
         505 (2009-10).

         Beth A. Cianffone & Thomas A. Baker III, The Use of
         Student-Athlete Likenesses in Sport Video Games. An
         Application of the Right of Publicity, 20 J. LEGAL ASPECTS
         SPORT 35 (2010).

         William J. Maher, Symposium, Digital Archives:
         Navigating the Legal Shoals: If Only We Could Reach the
         Shoals: Barriers to Archives Digitization, 34 COLUM. J.L.
         & ARTS 5 (2010).

         Nathan K. McGregor, Note, The Weak Protection of
         Strong Encryption: Passwords, Privacy, and Fifth
         Amendment Privilege, 12 VAND. J. ENT. & TECH. L. 581
         (2010).

         John F. Mckenzie, U.S. Export Controls on Internet
         Software Transactions, 44 INT'L LAW. 857 (2010).

         Mary Catherine Moore, Note, There Is No "I" in NCAA:
         Why College Sports Video Games Do Not Violate College
         Athletes' Rights of Publicity Such to Entitle Them to
         Compensation for Use of Their Likenesses, 18 J. INTELL.
         PROP. L. 269 (2010).

         Maria Pallante, Symposium, Digital Archives: Navigating
         the Legal Shoals: Orphan Works, Extended Collective
         Licensing and Other Current Issues, 34 COLUM. J.L. &
         ARTS 23 (2010).

         Maria Pallante & Mary Rasenberger, Symposium, Digital
         Archives: Navigating the Legal Shoals: Questions and
         Answers, 34 COLUM. J.L. & ARTS 23 (2010).

         Mary Rasenberger, Symposium, Digital Archives:
         Navigating the Legal Shoals: Copyright Issues and Section
         108 Reform, 34 COLUM. J.L. & ARTS 15 (2010).

         Keith Porcaro, Article, Private Ordering and Orphan
         Works: Our Least Worst Hope?, 2010 DUKE L. & TECH.
         REV. 15 (2010).

         Jonathan Reich, Article, The Class Defense: Why
         Dispersed Intellectual Property Defendants Need
         Procedural Protections, 2010 DUKE L. & TECH. REV. 9
         (2010).

         Steven M. Reilly, Note, Losing My Edge n1: The
         Copyright Implications of Audioblogging and Why Blogs
         Matter to the Music Industry, 12 VAND. J. ENT. & TECH. L.
         439 (2010).

         Marc L. Roark, Article, Limitation Of Sales Warranties as
         an Alternative to Intellectual Property Rights: An
         Empirical Analysis of iPhone Warranties' Deterrent
         Impact on Consumers, 2010 DUKE L. & TECH. REV. 18
         (2010).

         David Roh, Two Copyright Cases from a Literary
         Perspective, 22 L. & LITERATURE 110 (2010).

         Leah Shen, Article, Who Owns The Virtual Items?, 2010
         DUKE L. & TECH. REV. 11 (2010).

         Symposium, Digital Archives: Navigating the Legal
         Shoals: Archives in the Digital Age, 34 COLUM. J.L. &
         ARTS 37 (2010).

         Symposium, Digital Archives: Navigating the Legal
         Shoals: Email as Archives: You Have To Have It Before
         You Worry About It, 34 COLUM. J.L. & ARTS 43 (2010).

         Symposium, Digital Archives: Navigating the Legal
         Shoals: International Issues: Which County's Law Applies
         When Works Are Made Online, 34 COLUM J.L. & ARTS 49
         (2010).

         Symposium, Digital Archives: Navigating the Legal
         Shoals: Question and Answers, 34 COLUM. J.L. & ARTS 61
         (2010).

         Irene Tan, Note, Knock It off, Forever 21! The Fashion
         Industry's Battle against Design Piracy, 18 J.L. & POL'Y
         893 (2010).

         Dr. Yijun Tian, Article, The Impacts of the Chinese
         Anti-Monopoly Law On IP Commercialization in China &
         General Strategies for Technology-Driven Companies and
         Future Regulators, 2010 DUKE L. & TECH. REV. 4 (2010).

         Matthew W. Turetzky, Article, Applying Copyright
         Abandonment in The Digital Age, 2010 DUKE L. & TECH.
         REV. 19 (2010).

7.1 Patent
     7.1.0 General

         Jennifer Carter-Johnson, Unveiling the Distinction
         between the University and its Academic
         Researchers: Lessons for Patent Infringement and
         University Technology Transfer, 12 VAND. J. ENT. &
         TECH. L. 473 (2010).

         Colleen V. Chien, From Arms Race to Marketplace:
         The Complex Patent Ecosystem and Its Implications
         for the Patent System, 62 HASTINGS L.J. 297 (2010).

         John Cordani, Note, Patent At Your Own Risk.
         Linguistic Fences And Abbott Laboratories v.
         Sandoz, Inc, 95 CORNELL L. REV. 1221 (2010).

         Brandon Darden, Commentary, Definitional
         Vagueness in the CFAA: Will Cyberbullying Cause
         the Supreme Court To Intervene, 13 SMU SCI. &
         TECH. L. REV. 329 (2010).

         Elizabeth T. Joseph, Note, Apocalypse Soon. How
         the Implementation of Web Services Changes the
         Game for Extraterritoriality, 36 IOWA J. CORP. L.
         239 (2010).

         Ed Levy, Ph.D, Patent Pools and Genomics:
         Navigating a Course to Open Science?, 16 B.U.J.
         SCI. & TECH 75 (2010).

         John D. Love et al., Complex Patent Cases:
         Observations from the Bench, 13 COMP. L. REV. 2
         (2010).

         John D. Love et al., Complex Patent Cases:
         Observations from the Bench, 13 SMU SCI. & TECH.
         L. REV. 121 (2010).

         Jonathan Hillel, Article, Standards X Patents /
         Antitrust = [Infinite]: The Inadequacy Of Antitrust
         To Address Patent Ambush, 2010 DUKE L. & TECH.
         REV. 17 (2010).

         Matthew Moore, Article, In Re Bilski And The
         "Machine-Or-Transformation" Test: Receding
         Boundaries For Patent-Eligible Subject Matter, 2010
         DUKE L. & TECH. REV. 5 (2010).

         Maxwell R. Morgan, Regulation Of Innovation
         Under Follow-On Biologics Legislation. FDA
         Exclusivity As An Efficient Incentive Mechanism, 11
         COLUM. SCI. & TECH. L. REV. 93 (2010).

         Phong D. Nguyen, A Survey of Patent Law in
         Cyberspace, 66 BUS. LAW. 197 (2010).

         William Michael Schuster, Predictability and
         Patenable Processes: The Federal Circuits In Re
         Bilski Decision And Its Effect On The Incentive To
         Invent., 11 COLUM. SCI. & TECH. L. REV. 1 (2010).

         Sean B. Seymore, The Teaching Function of Patents,
         85 NOTRE DAME L. REV. 621 (2010).

         Lawrence A. Stahl & Robert H. Fischer, The Value
         of Patents to Technology Driven Companies, 22
         INTELL. PROP. & TECH. L. J. 27 (2010).

         Saami Zain, Quanta Leap or Much Ado About
         Nothing? An Analysis on the Effect of Quanta vs. LG
         Electronics, 20 ALB. L.J. SCI. & TECH. 67 (2010).

7.1.1 Software Patent

         Jamie Bertha, Clear and Convincing Evidence--Or
         Something Less?, 2010 PGH. J. TECH. L. & POL'Y
         174 (2010).

         Fabian Edlund, Software Related Inventions at the
         Enlarged Board of Appeals, 92 J. PAT. &
         TRADEMARK OFF. SOC'Y 131 (2010).

         Grand Theft Architecture: Architectural Works in
         Video Games After E.S.S. Entertainment v. Rockstar
         Games, 25 BERKELEY TECH. L.J. 429 (2010).

         W. Keith Robinson, Ramifications of Joint
         Infringement Theory on Emerging Technology
         Patents, 18 TEX. INTELL. PROP. L.J. 335 (2010).

         Greg Vetter, Patenting Cryptographic Technology,
         84 CHI,-KENT L. REV. 757 (2010).

     7.1.2 Biotech Patent

         Jennifer Giordano-Coltart et al., No Legal Monopoly
         for Genes: Court Rules Genes Are Unpatentable
         Subject Matter, 22 INTELL. PROP. & TECH. L. J. 8
         (2010).

         Kanchana Kariyawasam, Legal Liability, Intellectual
         Property And Genetically Modified Crops: Their
         Impact On World Agriculture, 19 PAC. RIM L. &
         POL'Y J. 459, (2010).

         Ashley McHugh, Note, Invalidating Gene Patents:
         Association Jot Molecular Pathology v. U.S. Patent
         & Trademark Office, 62 HASTINGS L.J. 185 (2010).

         Winston P. Nagane et al., Misappropriation of Shuar
         Traditional Knowledge (TK) and Trade Secrets: A
         Case Study on Biopiracy in the Amazon, 15 J. TECH.
         L. & POL'Y 9 (2010).

         Lisa Larrimore Ouellette, Note, Access to Bio-Knowledge:
         From Gene Patents to Biomedical
         Materials, SWAN. TECH. L. REV. 1 (2010).

         Marisa Noelle Pins, Note, Impeding Access to
         Quality Patient Care and Patient Rights: How
         Myriad Genetics' Gene Patents Are Unknowingly
         Killing Cancer Patients and How to Calm the Ripple
         Effect, 17 J. INTELL. PROP. L. 377 (2010).

         Tempe Smith, Note, Going to Seed?: Using
         Monsanto as a Case Study to Examine the Patent
         and Antitrust Implications of the Sale and Use of
         Genetically Modified Seeds, 61 ALA. L. REV. 629
         (2010).

         Michael Stumo, Article, Anticompetitive Tactics in
         A G Biotech Could Stifle Entrance Of Generic Traits,
         15 DRAKE J. AGRIC. L. 137 (2010).

7.2 Software Copyright
     7.2.0 General

         R. Michael Azzi, Note, CPR: How Jacobsen v.
         Katzer Resuscitated the Open Source Movement,
         2010 U. ILL. L. REV. 1271 (2010).

         Steven Masur & Cynthia Katz, ISP Licensing--A
         Carrot to the Stick of Three-Strike Laws, 13 SMU
         SCI. & TECH. L. REV. 283 (2010).

         Benjamin I. Narodick, Mothered by Judicial Love:
         How Jacobsen v. Katzer Could Bring Open Source
         Software Development to a Standstill, 16 B.U.J.
         SCI. & TECH. L. 264 (2010).

         Jon L. Phelps, Copyleft Termination: Will the
         Termination Provision of the Copyright Act of 1976
         Undermine the Free Software Foundation's General
         Public License?, 50 JURIMETRICS J. 261 (2010).

         David W. Quist, Three Strikes and You're Out: A
         Survey of Foreign Approaches to Preventing
         Copyright Infringement on the Internet, 66 BUS.
         LAW. 261 (2010).

         Sara D. Sunderland, Domain Name Speculation: Are
         We Playing Whac-A-Mole?, 25 BERKELEY TECH.
         L.J. 465 (2010).

         Andrew J. Tibbetts & Edmund J. Walsh, Reassessing
         The Benefits and Risks of Open Source Software, 22
         INTELL. PROP. & TECH. L. J. 9 (2010).

         David A. Wormse, Open-Source Software: The
         Value of "Free, " 22 INTELL. PROP. & TECH. L. J. 22
         (2010).

     7.2.1 User Interface

         Emily Prudente, Note, Open Source or Open
         Season?: What legal professionals need to know
         about open source software before dealing in
         corporate transactions and the ramifications of
         GPLv3, SYRACUSE SCI. & TECH. L. REP. 79 (2010).

     7.2.2 Fair Use

     7.2.3 Video Game

         Yval Karniel, Copyright in Second Life, 20 ALB. L.J.
         SCI & TECH. 433 (2010).

         Symposium, International Summit on the Law and
         Business of Video Games: Panel. The Future of
         Digital Distribution, 13 SMU SCI. & TECH. L. REV.
         139 (2010).

         Symposium, International Summit on the Law and
         Business of Video Games: Panel: The Future of
         Digital Distribution, 13 SMU SCI. & TECH. L. REV.
         161 (2010).

         Symposium, International Summit on the Law and
         Business of Video Games: Panel: The Future of
         Digital Distribution, 13 SMU SCI. & TECH. L. REV.
         187 (2010).

         Symposium, International Summit on the Law and
         Business of Video Games. Panel: The Future of
         Digital Distribution, 13 SMU SC1. & TECH. L. REV.
         197 (2010).

         Jennifer K. Vitale, Comment, Video Game Piracy In
         The Philippines: A Narrowly Tailored Analysis Of
         The Video Game Industry & Subculture, 22 PACE
         INT'L L. REV. 297 (2010).

7.3 Digital Copyright
     7.3.0 General

         Annemarie Bridy, Graduated Response and the Turn
         to Private Ordering in Online Copyright
          Enforcement, 89 OR. L. REV. 81 (2010).

         Andrew Dickinson, Comment, The Force be with
         EU? Infringements of US Copyright in the English
         Courts, 2010 LLOYD'S MAR. & COM. L. Q. 181
         (2010).

         Peter Dungan, Less Is More: Encouraging Greater
         Competition In Computer Software Procurement By
         Simplifying The DFARS Licensing Scheme, PUB.
         CONT. L.J., Spring 2010, at 456.

         Katie Fortney, Ending Copyright Claims in State
         Primary Legal Materials: Toward an Open Source
         Legal System, 102 LAW LIBR. J. 59 (2010).

         Alessandra Glorioso, Note, Google Books: An
         Orphan Works Solution?, 38 HOFSTRA L. REV. 971
         (2010).

         James G. H. Griffin, The effect of the Digital
         Economy Act 2010 upon 'semiotic democracy', 24
         INT'L REV. LAW, COMP. & TECH. 251 (2010).

         Patrick Johnson, Google Working to Limit Electronic
         Piracv, 2010 PGH. J. TECH. L. & POL'Y 169 (2010).

         Charles W. Hazelwood, Jr., Fair Use and the
         Takedown/put Back Provisions of the Digital
         Millennium Copyright Act, 50 IDEA 307 (2010).

         Stephen Hoffma, An Illustration of Hashing and Its
         Effect on Illegal File Content in the Digital Age, 22
         INTELL. PROP. & TECH. L. J. 6 (2010).

         Nathan Irving, Copyright Law for the Digital World:
         An Evaluation of Reform Proposals, 10 ASPER REV.
         INT'L BUS. & TRADE L. 141 (2010).

         George Jiang, Note, Rain and Other Non-Infringing
         Uses in the Context of Cloud Computing, 36 J.
         LEGIS. 395 (2010).

         Robert M. Kunstadt, The Proposed Google Book
         Settlement and a Modest Proposal, 22 INTELL. PROP.
         & TECH. L. J. 26 (2010).

         Michael F. Morgan, The Cathedral and the Bizarre:
         An Examination of the "Viral" Aspects of the CPL,
         27 J. MARSHALL J. COMPUTER & INFO. L. 349
         (2010).

         Will Moseley, A New (Old) Solution ,for Online
         Copyright Enforcement After Thomas and
         Tenenbaum, 25 BERKELEY TECH. L.J. 311 (2010).

         Jonathon W. Penney, Technology and Judicial
         Reason: Digital Copyright, Secondary Liability, and
         the Problem of Perspective, 22 I.P.J. 251 (2010).

         Mary E. Rasenberger et al., When Is a Service
         Provider Liable for Inducement Under Grokster?, 22
         INTELL. PROP. & TECH. L. J. 6 (2010).

         Robert H. Rotstein et al., The First Sale Doctrine in
         the Digital Age, 22 INTELL. PROP. & TECH. L. J. 23
         (2010).

         Jacob Adam Schroeder, Anti-Circumvention of
         Competition: Avoiding Conflict Between the DMCA
         and Antitrust, 50 IDEA 463 (2010).

         Stephanie Spangler, Note, When Indigenous
         Communities Go Digital: Protecting Traditional
         Cultural Expressions Through Integration Of Ip And
         Customary Law, 27 CARDOZO ARTS & ENT. L. J. 709
         (2010).

         Joseph Storch & Heidi Wachs, A Legal Matter:
         Peer-to-Peer File Sharing, the Digital Millennium
         Copyright Act, and the Higher Education
         Opportunity Act: How congress and the
         Entertainment Industry Missed an Opportunity to
         Stem Copyright Infringement, 74 ALB. L. REV. 313
         (2010-11).

         Marketa Trimble, Setting Foot on Enemy Ground:
         Cease-and-Desist Letters, DMCA Notifications and
         Personal Jurisdiction in Declaratory Judgment
         Actions, 50 IDEA 777,779 (2010).

     7.3.1 Electronic Compilation

         Eric Fraser, Antitrust and the Google Books
         Settlement: The Problem of Simultaneity, STAN.
         TECH. L. REV. 4 (2010).

         Gregory K. Leonard, The Proposed Google Books
         Settlement: Copyright, Rule 23, and DOJ Section 2
         Enforcement, ANTITRUST, Summer 2010, at 26.

         Juliet M. Moringiello & William L. Reynolds,
         Electronic Contracting Cases 2009-2010, 66 BUS.
         LAW. 175 (2010).

     7.3.2 Computer Database

         Jonathan Gingerich, A.V. Ex. Rel. Vanderhye v.
         Iparadigms, LLC: Electronic Databases and the
         Compartmentalization of Fair Use, 50 IDEA 345
         (2010).

     7.3.3 Multimedia

         Vanessa Van Cleaf, Note, A Broken Record: The
         Digital Millennium Copyright Act's Statutory
         Royalty Rate-Setting Process Does Not Work for
         Internet Ratio, 40 STETSON L. REV. 341 (2010).

         Brian R. Day, Collective Management of Music
         Copyright in the Digital Age: The Online
         Clearinghouse, 18 TEX. INTELL. PROP. L.J. 195
         (2010).

         Lital Helman, Pull Too Hard and the Rope May
         Break: On the Secondary Liability of Technology
         Providers for Copyright Infringement, 19 TEX.
         INTELL. PROP. L.J. 111 (2010).

         Jeffrey Malkan, The Public Performance Problem in
         Cartoon Network LP v. CSC Holdings, Inc., 89 OR.
         L. REV. 505 (2010).

         Irene M. Pla, This Picture is Becoming Fuzzy:
         Cartoon Network v. CSC Holdings Blurs the Line
         Between Direct and Secondary Copyright
         Infringement, 38 AIPLA Q.K. 85 (2010).

         Priti Trivedi, Note, Writing the Wrong: What the E-Book
         Book Industry Can Learn from Digital Music's
         Mistakes with DRM, 18 J.L. & POL'Y 925 (2010).

     7.3.4 Computer-Generated Works

         John E. D. Larkin, Criminal and Civil Liability for
         User Generated Content: Craigslist, A Case Study,
         15 J. TECH. L. & POL'Y 85 (2010).

7.4 Trademark

         Joni Borzcik & Nick Cole, Perfect 10 v. Visa International
         (Part Six. Trademarks and the Internet), 19 J. CONTEMP.
         LEGAL ISSUES 506 (2010).

         Kevin Blum et. al., Consistency of Confusion? A Fifteen-Year
         Revisiting of Barton Beebe's Empirical Analysis of
         Multifactor Tests for Trademark Infringement, STAN.
         TECH. L. REV. 3 (2010).

         Stacey L. Dogan, Business Law Forum: Intellectual
         Property Remedies: Trademark Remedies and Online
         Intermediaries, 14 LEWIS & CLARK L. REV. 467 (2010).

         Richard A. Kamprath, Patent Pleading Standards After
         Iqbal: Applying Infringement Contentions As A Guide, 13
         SMU SCI. & TECH. L. REV. 301 (2010).

         Ben Kleinman, Trademark, Service Mark, and Trade Name
         Protection and Misappropriation in Cyberspace: A Survey
         of Changes and Developments in the Law from June
         2009--June 2010, 66 BUS. LAW. 213 (2010).

         Nils Maack, Brookfield Communications v. West Coast
         Entertainment (Part Six. Trademarks and the Internet), 19
         J. CONTEMP. LEGAL ISSUES 497 (2010).

         Steve McKelvey et al., Caught in the Web?: The
         Communication of Trademark Rights and Licensing Policy
         on University Official Athletic Websites, 20 J. LEGAL
         ASPECTS SPORT 1 (2010).

         Ellie Mercado, As Long As It's Not Counterfeit: Holding
         E-Bay Liable For Secondary Trademark Infringement in
         the Wake of LVMH and Tiffany Inc., 28 CARDOZO ARTS
         ENT. L.J. 115 (2010).

         Ellie Mercado, Note, As Long As "It" Is Not Counterfeit:
         Holding Ebay Liable For Secondary Trademark
         Infringement In The Wake Of Lvmh And Tiffany Inc., 28
         CARDOZO ARTS & ENT. L. J. 115 (2010).

         Kimberly J. Miller, The Uniform Dispute Resolution
         Policy: An Uphill Fight for Domain Name Registrants
         (Part Six: Trademarks and the Internet), 19 J. CONTEMP.
         LEGAL ISSUES 520 (2010).

         Donald L. Prutzman, The Developing U.S. Law Regarding
         the Invisible Use of the Trademarks of Others in
         Cyberspace, 23 INT'L L. PRACT. 93 (2010).

         Tyson Smith, Note, Googling a Trademark: A
         Comparative Look at Keyword Use in Internet Advertising,
         46 TEX. INT'L L.J. 231 (2010).

         Michelle Traher, When Metropolitan Life MET Most Erotic
         Teens (Part Six. Trademarks: and the Internet), 19 J.
         CONTEMP. LEGAL ISSUES 530 (2010).

         Virginia Welch, Commentary, Contributory Trademark
         Infringement: Who Bears the Burden of Policing Online
         Counterfeit Activity,?, 13 SMU SCL & TECH. L. REV. 361
         (2010).

     7.5 Trade Secret

     7.6 Semiconductor Chip Protection

     7.7 Licensing

         Caitlin J. Akins, Note, Conversion of Digital Property:
         Protecting Consumers in the Age of Technology, 23 LOY.
         CONSUMER L. REV. 215 (2010).

     7.8 Intellectual Property Issues of the Internet

         Abbe E. L. Brown, Access to Essential Technologies: The
         Role of the Interface Between Intellectual Property,
         Competition and Human Rights, 24 INT'L REV. LAW,
         COMP. & TECH. 51 (2010).

         Jared O. Freedman & Duane C. Pozza, Renewed Interest in
         "Hot News" Misappropriation Claims Against Online
         Aggregators of News and Information, 22 INTELL. PROP. &
         TECH. L. J. 1 (2010).

         Rebecca Goulding et al., Alternative Intellectual Property
         for Genomics and the Activity of Technology Transfer
         Offices: Emerging Directions in Research, 16 B.U.J. SCI.
         & TECH. L. 194 (2010).

         Blake Holland, The Winding Stream. Entitlement Theories
         and Intellectual Property Rights in Emerging Media
         Technologies, 25 BERKELEY TECH. L.J. 247 (2010).

         J. Scott Larson, Enforcing Intellectual Property Rights to
         Deter Phishing, 22 INTELL. PROP. & TECH. L. J. 1 (2010).

         Sahir Munir Mehar, Peer to Peer File Sharing Test of
         International Conventions on the Protection of Intellectual
         Property, 43 L/TECH., no. 3, 2010, 21.

         Kuruvilla J. Olasa, Two Conflicting Approaches to [section]
         512(c): Io v. Veoh and UMG v. Veoh, 25 BERKELEY
         TECH. L.J. 347 (2010).

         Brett White, Note, Viacom v. Youtube: A Proving Ground
         for DMCA Safe Harbors Against Secondary Liability, 24
         ST. JOHN'S J.L. COMM. 811 (2010).

7.9 International Developments
     7.9.0 General

         Sophie Stalla-Bourdillon, Regulating the Electronic
         Marketplace Through Extraterritorial Legislation:
         Google and eBay in the Line of Fire of French
         Judges, 24 INT'L REV. LAW, COMP. & TECH. 39
         (2010).

         Derek John Illar, Cyber Fatwas and Classical
         Islamic Jurisprudence, 27 J. MARSHALL J.
         COMPUTER & INFO. L. 577 (2010).

         Makeen F. Makeen, The Controversy Of
         Simultaneous Cable Retransmission To Hotel Rooms
         Under International And European Copyright Laws,
         57 J. COPYRIGHT SOC'Y U.S.A. 59 (2010).

         Abhilash Nair, Perils of Technology and the
         Regulatory Dilemma, 24 INT'L REV. LAW, COMP. &
         TECH. 205 (2010).

     7.9.1 GATT-TRIPS

     7.9.2 NAFTA

     7.9.3 Developments in Canada

     7.9.4 Developments in Mexico and Latin America

         Allison L. Whiteman, Comment, Cross Retaliation
         Under the TRIPS Agreement: An Analysis of Policy
         Options for Brazil, 36 N.C.J. INT'L L. & COM. REG.
         187 (2010).

     7.9.5 Developments in Australia and New Zealand

     7.9.6 Developments in Africa

     7.9.7 Developments in Asia

         Smeeta Mishra & Gaby Semaan, Islam in
         Cyberspace: South Asian Muslims in America Log
         In, 54 J. BROAD. & ELEC. MEDIA 87 (2010).

         Hwan Kim, The World Trade Organization Dispute
         Settlement System. China Measures Affecting The
         Protection and Enforcement of Intellectual Property
         Rights, N.Y. INT. L. REV, Winter, 2010, at 1.

     7.9.8 Developments in Western Europe

         Joseph A. Cannataci & Jeanne Pia Mifsud Bonnici,
         The End of the Purpose-Specification Principle in
         Data Protection?, 24 INT'L REV. LAW, COMP. &
         TECH. 101 (2010).

         Audrey Guinchard, Crime in Virtual Worlds: The
         Limits of Criminal Law, 24 INT'L REV. LAW, COMP.
         & TECH. 175 (2010).

         T. J. McIntyre, Blocking Child Pornography on the
         Internet. European Union Developments, 24 INT'L
         REV. LAW, COMP. & TECH. 209 (2010).

         Eva Nagle, 'To every cow its calf to every book its
         copy': Copyright and illegal downloading after EMI
         (Ireland) Ltd and Ors v. Eircom Ltd [2010] IEHC
         108, 24 INT'L REV. LAW, COMP. & TECH. 309
         (2010).

         Elise M. Simbro, Note, Disclosing Stored
         Communication Data to Fight Crime: The U.S. and
         EU Approaches to Balancing Competing Privacy
         and Security Interest, 43 CORNELL INT'L L.J. 585
         (2010).

         Faye Fangfei Wang & Nathan Griffiths, Protecting
         Privacy in Automated Transaction Systems: A Legal
         and Technological Perspective in the European
         Union, 24 INT'L REV. LAW, COMP. & TECH. 153
         (2010).

     7.9.9 Developments in Eastern Europe and Russia

         Benjamin Lesjak, Perception and willingness of the
         Slovenian legal profession to use videoconference,
         24 INT'L REV. LAW, COMP. & TECH. 93 (2010).

8. COMPUTERS AND LEGAL REASONING
     8.0 General

         Kenneth A. Bamberger, Technologies of Compliance. Risk
         and Regulation in a Digital Age, 88 TEX. L. REV. 669
         (2010).

         Natalie Madden & Rachel Wilson, The "True Object" Test
         v. Technology, 28 J. ST. TAX'N 37 (2010).

         Liz Polding et al, Interaction and Reflection: A New
         Approach to Skills and Accounts Teaching on the Legal
         Practice Course, 24 INT'L REV. LAW, COMP. & TECH. 83
         (2010).

     8.1 Artificial Intelligence

         Gabriel Hallevy, I, Robot--I, Criminal:--When Science
         Fiction Becomes Reality: Legal Liability of Al Robots
         committing Criminal Offenses, SYRACUSE SCI. & TECH. L.
         REP. 1 (2010).

9. LEGAL ISSUES OF THE INTERNET
     9.0 General

         Julie Blackman et al., Correcting Juror Bias: A Case Study
         On Internet Entrapment. 34-NOV CHAMP 30 (2010).

         P.A. Bernal, The Symbiotic Web, 24 INT'L REV. LAW,
         COMP. & TECH. 25 (2010).

         Charles M Davidson & Michael J. Santorell, Seizing the
         Mobile Moment. Spectrum Allocation Policy for the
         Wireless Broadband Century, 19 COMMLAW CONSPECTUS
         1 (2010).

         William R. Denny, Survey of Recent Developments in the
         Law of Cloud Computing and Software as a Service
         Agreement, 66 BUS. LAW. 237 (2010).

         Michael H. Dore, Forced Preservation: Electronic
         Evidence And The Business Records Hearsay Exception,
         11 COLUM. SCI. & TECH. L. REV. 76 (2010).

         Elizabeth C. Eraker, Stemming Sexting: Sensible Legal
         Approaches to Teenagers' Exchange of Self-Produced
         Pornography, 25 BERKELEY TECH. L.J. 555 (2010).

         George S. Ford, Lawrence J. Spiwak, & Michael L. Stern,
         The Broadband Credibility Gap, 19 COMMLAW
         CONSPECTUS 75 (2010).

         Kelly A. Gable, Cyber-Apocalypse Now: Securing the
         Internet against Cyberterrorism and Using Universal
         Jurisdiction as a Deterrent, 43 VAND. J. TRANSNAT'L L. 57
         (2010).

         Catherine R. Gellis, The State of the Law Regarding
         Website Owner Liability for User Generated Content, 66
         BUS. LAW. 243 (2010).

         Olivia M. Fleming, Note, Oh La, La! How Will The
         Polarized Decisions Of The United States And France
         Regarding The Responsibility For Policing Trademarks On
         Online Auction Sites Be Synthesized?, 20 IND. INT'L &
         COMP. L. REV. 313 (2010).

         Milana S. Karayandi, Regulability of the Internet, 43
         L./TECH., no. 2, 2010, 18.

         Alison V. King, Note, Constitutionality of Cyberbullying
         Laws: Keeping the Online Playground Safe for Both Teens
         and Free Speech, 63 VAND. L. REV. 845 (2010).

         Kevin F. King, Geolocation And Federalism On The
         Internet: Cutting Internet Gambling's Gordian Knot, 11
         COLUM. SCI. & TECH. L. REV. 41 (2010).

         David Mongillo, Senator Durbin Challenges the
         Technology Industry to Help Prevent International Human
         Rights Violations, 2010 PGH. J. TECH. L. & POL'Y
         1 (2010).

         Alina Ng, When Users are Authors: Authorship in the Age
         of Digital Media, 12 VAND. J. ENT. & TECH. L. 853 (2010).

         Yvette Ostolaza & Ricardo Pellafone, Applying Model Rule
         4.2 to Web 2.0: The Problem of Social Networking Sites,
         11 J. HIGH TECH. L. 56 (2010).

         Amy Kristin Sanders, Defining Defamation: Community In
         The Age Of The Internet, 15 COMM. L. & POL'Y 231
         (2010).

         Linda J. Shorey & Anthony R. Holtzman, Survey of
         Significant Developments in Internet Gambling, 66 BUS.
         LAW. 249 (2010).

         Kathryn A. Watson, Note, White Open Spaces: Unlicensed
         Access to Unused Television Spectrum Will Provide an
         Unprecedented Level of Interconnectivity, 2010 U. ILL. J.L.
         TECH. & POL'Y 181 (2010).

9.1 ISP and Internet Access
     9.1.0 General

         Rob Frieden, Invoking and Avoiding the First
         Amendment: How Internet Service Providers
         Leverage Their Status as Both Content Creators and
         Neutral Conduits, 12 U. PA. J. CONST. L. 1279
         (2010).

         Timothy D. Martin, Hey! You! Get Off of My Cloud:
         Defining and Protecting the Metes and Bounds of
         Privacy, Security, and Property in Cloud Computing,
         92 J. PAT. & TRADEMARK OFF. SOC'Y 283 (2010).

     9.1.1 Net Neutrality

         Marvin Ammori, Media And The Law Symposium:
         When Does Government Regulation Go Too Far?:
         Essay: Strange Bedfellows: Network Neutrality's
         Unifying Influence+, 22 REGENT U.L. REV.
         335, (2009/2010).

         Jane E. Kirtley, Book Review, Virtual Freedom: Net
         Neutrality and Free Speech in the Internet Age, 50
         JURIMETRICS J. 539 (2010).

         Chris Millen, Europe Addresses Net Neutrality in
         Summit, 2010 PGH. J. TECH. L. & POL'Y 166 (2010).

9.2 Domain Names

         Moe Alramahi, New gTLDs--Pandora's Box Is Open, 24
         INT'L REV. LAW, COMP. & TECH. 183 (2010).

         Clay Calvert, Salvaging Privacy & Tranquility from the
         Wreckage: Images of Death, Emotions of Distress &
         Remedies of Tort in the Age of the Internet, 2010 MICH. ST.
         L. REV. 311 (2010).

         Paul Godfread & Kristine Dorrain, Developments in
         Domain Names, 66. BUS. LAW. 221 (2010).

         Daniel Hancock, Note, You Can Have It, But Can You
         Hold It?: Treating Domain Names as Tangible Property,
         99 KY. L.J. 185 (2010-11).

         Michael R. Mattioli, Cooling-Off & Secondary Markets:
         Consumer Choice in the Digital Domain, 15 VA. J.L. &
         TECH. 227 (2010).

9.3 Civil Procedure in Cyberspace

         Cynthia R. Farina, Achieving the Potential: The Future of
         Federal E-Rulemaking, 62 ADMIN. L. REV. 279 (2010).

         Michael Fleming & Kristin Dorrain, Survey of the Law of
         Cyberspace Introduction, 66 BUS. LAW. 155 (2010).
         Robert E. Rains, Marriage in the Time of Internet
         Ministers: I Now Pronounce You Married, But Who Am I
         To Do So?, 64 U. MIAMI L. REV. 809 (2010).

         Lauren A. Rieders, Note, Old Principles, New Technology,
         And The Future Of Notice In Newspapers, 38 HOFSTRA L.
         REV. 1009 (2010).

9.4 Online Communities

     9.4.0 General


         Christopher S. Burrichter, Comment, Cyberbullying
         2.0. A "Schoolhouse Problem" Grows Up, 60
         DEPAUL L. REV. 141 (2010).

         Daniel H. Kahn, Social Intermediaries: Creating A
         More Responsible Web Through Portable Identity,
         Cross-Web Reputation, And Code-Backed Norms, 11
         COLUM. SCI. & TECH. L. REV. 176 (2010).

         Matthew Mastromauro, Note, Pre-Trial Prejudice
         2.0: How YouTube Generated News Coverage Is Set
         to Complicate the Concepts of Pre-Trial Prejudice
         Doctrine and Endanger Sixth Amendment Fair Trial
         Rights, 10 J. HIGH TECH. L. 289 (2010).

         Ebony Nicolas, Note, A Practical Framework For
         Preventing "Mistrial By Twitter, " 28 Cardozo Arts
         & Ent. L. J. 385 (2010).

         Jonathan A. Ophardt, Article, Cyber Warfare and the
         Crime of Aggression. The Need for individual
         Accountability on Tomorrow's Battlefield, 2010
         DUKE L. & TECH. REV. 3 (2010).

         Rebecca Tushnet, I Put You There. User-Generated
         Content and Anticircumvention, 12 VAND. J. ENT. &
         TECH. L. 889 (2010).

     9.4.1 Social Networking

         Thomas J. Curtin, Note, The Name Game.
         Cybersquatting and Trademark Infringement on
         Social Media Websites, 19 J.L. & POL'Y 353(2010).

         Eric M. Fink, Law School & the Web of Group
         Affilliation: Socializing, Socialization, and Social
         Network Site Use Among Law Students, 27 J.
         MARSHALL J. COMPUTER & INFO. L. 325 (2010).

         Emily H. Fulmer, Article, Privacy Expectations and
         Protections For Teachers In The Internet Age, 2010
         DUKE L. & TECH. REV. 14 (2010).

         Mikhia Hawkins & Melissa Landau Steinman, When
         Marketing Through Social Media, Legal Risks Can
         Go Viral, 22 INTELL. PROP. & TECH. L. J. 1 (2010).

         Brian Kane, Balancing Anonymity, Popularity, &
         Micro-Celebrity: The Crossroads of Social
         Networking & Privacy, 20 ALB. L.J. SCI & TECH. 327
         (2010).

         Sally Kift et al., Cyberbullying in Social Networking
         Sites and Blogs: Legal Issues for Young People and
         Schools, 20 J. L. INFO & SCI. 60 (2010).

         Mary G. Leary, Sexting or Self-Produced Child
         Pornography? The Dialogue Continues--Structured
         Prosecutorial Discretion within a Multidisciplinary
         Response, 17 VA. J. SOC. POL'Y & L. 486 (2010).

         Hanna Y.F. Lim, Virtual World, Virtual Land but
         Real Property, 2010 SING. J.L.S. 304 (2010).

         Dan Malachowski, Comment, "Username Jacking"
         in Social Media." Should Celebrities And Brand
         Owners Recover From Social Networking Sites When
         Their Social Media Usernames Are Stolen? 60
         DEPAUL L. REV. 223(2010).

         Matthew G. Minder, Note, Peer-To-Peering Beyond
         The Horizon." Can A P2p Network Avoid Liability By
         Adapting Its Technological Structure?, 84 CHI.-KENT
         L. REV. 943 (2010).

         Maria De-Miguel-Molina et al., An exploratory
         study on the privacy of children's images in Spain's
         most widely used social network sites (Tuenti and
         Facebook), 24 INT'L REV. LAW, COMP. 8,: TECH. 277
         (2010).

         Sharon Nelson et al., The Legal Implications Of
         Social Networking, 22 REGENT U.L. REV. 1
         (2009/2010).

         Evan E. North, Comment & Note, Facebook Isn't
         Your Space Anymore. Discovery of Social
         Networking Websites, 58 U. KAN. L. REV. 1279
         (2010).

         Zorik Pesochinsky, Note, Almost Famous."
         Preventing    Username-Squatting On Social
         Networking Websites, 28 CARDOZO ARTS & ENT. L.
         J. 223 (2010).

         Rachel A. Purcell, Note, Is That Really Me?: Social
         Networking and the Right of Publicity, 12 VAND. J.
         ENT. & TECH. L. 611 (2010).

         Jason Richard Sheppard, Note, The Thrill of Victory,
         And the Agony of the Tweet: Online Social Media,
         the Non-Copyrightability of Events, and How to
         Avoid a Looming Crisis by Changing Norms, 17 J.
         INTELL. PROP. L. 445 (2010).

         Yang-Ming Tham, Comment, Honest to Blog:
         Balancing the Interests of Public Figures and
         Anonymous Bloggers in Defamation Lawsuits, 17
         VILL. SPORTS & ENT. L.J. 229 (2010).

         Jacob Werrett, Note, Aligning Cyber-World
         Censorship with Real-World Censorship, 9 CONN.
         PUB. INT. L.J. 357 (2010).

     9.4.2 Virtual Worlds

         Joshua A.T. Fairfield, Virtual Justice: The New Laws
         of Online Worlds, 51 JURIMETRICS J. 89 (2010).

         Risa J. Weaver, Online Fantasy Sports Litigation
         And The Need For A Federal Right Of Publicity
         Statute, 2010 DUKE L. & TECH. REV. 2 (2010).

9.5 First Amendment Concerns

         Marc Jonathan Blitz, Stanley in Cyberspace: Why the
         Privacy Protection of the First Amendment Should Be
         More Like That of the Fourth, 62 HASTINGS L.J. 357
         (2010).

         Kathy Lutrell Garcia, Poison Pens, Intimidating Icons, and
         Worrisome Websites: Off-Campus Student Speech that
         Challenges Both Campus Safety and First Amendment
         Jurisprudence, 23 ST. THOMAS L. REV. 50 (2010).

         Allison E. Hayes, Note, From Armbands to Douchebags:
         How Doninger v. Niehoff Shows the Supreme Court Needs
         to Address Student Speech in the Cyber Age, 43 AKRON L.
         REV. 247 (2010).

         Christina Kube, Gang Expression On The Internet: Florida
         Statutes Section 874.11 Is A Violation Of First Amendment
         Rights, 59 CATH. U.L. REV. 1199 (2010).

         Daniel E. Mooney, Comment, Employer on the Web Wire:
         Balancing the Legal Pros and Cons of Online Employee
         Screening, 46 IDAHO L. REV. 733 (2010).

         Jessica Moy, Note, Beyond "The Schoolhouse Gates' and
         into the Virtual Playground." Moderating Student
         Cyberbullying and Cyberharassment After Morse v.
         Frederick, 37 HASTINGS CONST. L.Q. 565 (2010).

         Jeffrey G. Purvis, Newsperson Shield Laws and the New
         Media, 43 L./TECH., no. 4, 2010, 19.

         Joseph A. Tomain, Article, Cyberspace Is Outside The
         Schoolhouse Gate: Offensive, Online Student Speech
         Receives First Amendment Protection, 59 DRAKE L. REV.
         97, (2010).

10. LAW AND TECHNOLOGY

     10.0 General

         Lawrence Goldstein, Why Scientific Details Are Important
         When Novel Technologies Encounter Law, Politics, and
         Ethics, 38 J.L. MED. & ETHICS 204 (2010).

         Henry T. Greely & Mark M. Hernandez, Technology Law:
         What Is It-and What Should It Be?, 15 J. TECH. L. &
         POL'Y 1 (2010).

         Eric A. Greenwald, Cybersecurity Symposium: National
         Leadership, Individual Responsibility: History Repeats
         Itself The 60-Day Cyberspace Policy Review in Context,
         4 J. NAT'L SECURITY L. & POL'Y 41 (2010).

         David Richert, Fallibility of Automated Biometric
         Recognition Technologies, 94 JUDICATURE 141 (2010).

         Heidi Schuster, The Use of Google services and Tools in
         Academic Institutions--A Critical Review, 24 INT'L REV.
         LAW, COMP. & TECH. 17 (2010).

         Henry A. Waxman, Opportunities and Challenges In An
         Ever-Evolving Communications Landscape, 19
         COMMLAW CONSPECTUS I (2010).

         Ian Williams, "He Creditted More the Printed Booke":
         Common Lawyers' Receptivity to Print, c. 1550-1640, 28
         LAW & HIST. REV. 39 (2010).

     10.1 Technology Transfer

         Eric L. Lane, Article, Keeping The LEDs On and the
         Electric Motors Running: Clean Tech in Court After
         Ebay, 2010 DUKE L. & TECH. REV. 13 (2010).

     10.2 Audio/Video Recording

         Patrick Groves, Complaint Alleges School Used Laptop
         Webcams to Spy on Students, 2010 PGH. J. TECH. L. &
         POL'Y 1 (2010).

     10.3 Space Law

         Natalie Pusey, Note, The Case for Preserving Nothing:
         The Need for a Global Response to the Space Debris
         Problem, 21 COLO. J. INT'L ENVTL. L. & POL'Y 425
         (2010).

         Hirotaka Watanabe, Space Policy of the Johnson
         Administration." Project Apollo & the International
         Cooperation, 57 OSA. L. REV. 39 (2010).

     10.4 Medical Technology

         10.4.0 General

         Collin R. Bockman, Cybernetic-Enhancement Technology
         and the Future of Disability Law, 95 IOWA L. REV. 1315
         (2010).

         Gaia Bernstein, Direct-to-Consumer Genetic Testing."
         Gatekeeping the Production of Genetic Information, 79
         UMKC L. REV. 283 (2010).

         Jeremy O. Bressman & Jay S. Reidler, Note, Willful
         Modulation of Brain Activity in Disorders of
         Consciousness." Legal And Ethical Ramifications, 38 J.L.
         MED. & ETHICS 713 (2010).

         Beth A. Burkstrand-Reid, The More Things Change ... :
         Abortion Politics & The Regulation of Assisted
         Reproductive Technology, 79 UMKC L. REV. 361 (2010).

         June Carbone, Negating the Genetic Tie." Does the Law
         Encourage Unnecessary Risks?, 79 UMKC L. REV. 333
         (2010).

         Johanna Cooper Jennings, Juvenile Justice, Sullivan, and
         Graham." How the Supreme Court's Decision will Change
         the Neuroscience Debate, 2010 DUKE L. & TECH. REV. 6
         (2010).

         Lisa L. Dahm, Carrots and Sticks in the HITECH Act.
         Should Covered Entities Panic?, 22 HEALTH LAW. 1
         (2010).

         Neal Feigenson, Audiovisual communication and
         therapeutic jurisprudence: Cognitive and social
         psychological dimensions, 33 INT'L J.L. & PSYCHIATRY
         336 (2010).

         Carl E. Fisher & Paul S. Appelbaum, Diagnosing
         Consciousness." Neuroimaging, Law, and the Vegetative
         State, 38 J.L. MED. & ETHICS 374 (2010).

         Kerry L. Macintosh, Brave New Eugenics: Regulating
         Assisted Reproductive Technologies in the Name of Better
         Babies, 2010 U. ILL. J.L. TECH. & POL'Y 257 (2010).

         Joan Mahoney, Genome Mapping and Designer Babies: A
         Comparative Perspective, 79 UMKC L. REV. 309 (2010).

         Emily R. Mason, Ignoring It Will Not Make It Go Away:
         Guidelines.for Statutory Regulation of Physician-Assisted
         Death, 45 NEW ENG. L. REV. 139 (2010).

         Morgan Geller, Note, Every Woman Deserves Her Own
         Pair of Genes: The Constitutionality of Patenting the
         BRCA Genes in Association for Molecular Pathology v.
         U.S. Patent & Trademark Office, 34 NOVA L. REV. 765
         (2010).

         Ryan P. Kelly, Comment, The Use of Population Genetics
         in Endangered Species Act Listing Decisions, 37
         ECOLOGY L.Q. 1107 (2010).

         Deepthy Kishore, Comment, Test at Your Own Risk." Your
         Genetic Report Card and the Direct-To-Consumer Duty
         To Secure Informed Consent, 59 EMORY L.J. 1553 (2010).

         Cindy Ledennan, Science in the Courtroom: Vital to Best
         Interests and Reasonable Efforts, 61 JUV. & FAM. CT. J.
         63 (2010).

         Michael S. Pardo & Dennis Patterson, Philosophical
         Foundations of Law and Neuroscience, 2010 U. ILL. L.
         REV. 1211 (2010).

         Nicole C. Schuppner, Preimplantation Genetic Diagnosis.
         A Call for Public Sector Implementation of Private
         Advocacy Regulation, 14 MICH. ST. J. MED. & LAW 443
         (2010).

         Kayte K. Spector-Bagdady, Artificial Parentage:
         Screening Parents for Assisted Reproductive
         Technologies, 14 MICH. ST. J. MED. & LAW 457 (2010).

         Richard F. Storrow, Travel into the Future of
         Reproductive Technology, 79 UMKC L. REV. 295, (2010).

         Andrew W. Torrance, Family Law and the Genomic
         Revolution, 79 UMKC L. REV. 271 (2010).

         10.4.1 Electronic Records

         Jenna Caldarella, Comment, Privacy and Security of
         Personal Health Records Maintained by Online
         Health Services, 20 ALB. L.J. SCI. & TECH. 203
         (2010).

         Giuseppina D'Agostino & Dionne A. Woodward,
         Diagnosing Our Health Records in the Digital
         World: Towards a Legal Governance Model for the
         Electronic Health Record in Canada, 22 I.P.J. 127
         (2010).

         James C. Dechene, The Challenge of Implementing
         Interoperable Electronic Medical Records, 19
         ANNALS HEALTH L. 195 (2010).

         Mark A. Hall, Property, Privacy, and the Pursuit of
         Interconnected Electronic Medical Records, 95
         IOWA L. REV. 631 (2010).

         Sharona Hoffman, Employing E-Health: The Impact
         of Electronic Health Records on the Workplace, 19
         KAN. J.L. & PUB. POL'Y 409 (2009-10).

         Jonathan Loiterman, Free as in Freedom." Open
         Source Software's Role in Remaking Healthcare in
         the Twenty-First Century, 19 ANNALS HEALTH L.
         259 (2010).

         Marc A. Rodwin, Patient Data." Property, Privacy
         & the Public Interest, 36 AM. J. L. & MED. 586
         (2010).

         Nicolas P. Terry, Physicians and Patients Who
         "Friend" or "Tweet"." Constructing a Legal
         Framework for Social Networking in a Highly
         Regulated Domain, 43 IND. L. REV. 285 (2010).

         Stephen J. Weiser, Breaking Down the Federal and
         State Barriers Preventing the Implementation of
         Accurate, Reliable and Cost Effective Electronic
         Health Records, 19 ANNALS HEALTH L. 205 (2010).

     10.5 Science and Technology

         10.5.0 General

         Yaniv Heled, The Regulation Of Genetic Aspects Of
         Donated Reproductive Tissue--The Need For
         Federal Regulation, 11 COLUM. SCI. & TECH. L.
         REV. 243 (2010).

         Sheldon Krimsky, Academic Integrity: Combating
         the Funding Effect in Science: What's Beyond
         Transparency?, 21 STAN. L. & POL'Y REV 81
         (2010).

         Joanne Kwan, A Nail in the Coffin for Gene Patents,
         25 BERKELEY TECH. L.J. 9 (2010).

         Lee Shlamowitz, Note, The Sun and the Scythe:
         Combining Climate and Population Policy to Solve
         the Greatest Challenges the Worm Has Ever Faced,
         24 TEMP. INT'L & COMP. L.J. 247 (2010).

         Louis J. Virelli, III, Judging Darwin."
         Understanding the New Distributive Model of
         Evolution Instruction, 13 U. PA. J. CONST. L. 81
         (2010).

         John Zulkey, Note, The Obsolete Second
         Amendment." How Advances in Arms Technology
         Have Made the Prefatory Clause Incompatible with
         Public Policy, 2010 U. ILL. J.L. TECH. & POL'Y 213
         (2010).

         10.5.1 Biotechnology

         Jason G. Allen, Group Consent & The Nature Of
         Group Belonging." Genomics, Race & Indigenous
         Rights, 20 J. L. INFO & SCI. 28 (2010).

         Michael Bromby, Identification, Trust and Privacy:
         How Biometrics Can Aid Certification of Digital
         Signatures, 24 INT'L REV. LAW, COMP. & TECH.
         133 (2010).

         John M. Conley et al., Enabling Responsible Public
         Genomics, 20 HEALTH MATRIX 325 (2010).

         Jennifer L. Cornell, Infertile Grounds." Feminist
         Interpretations of Infertility Exclusions as Sex
         Discrimination, 28 LAW& INEQ. 163 (2010).

         David S. Dubinsky, Note, Video Software Dealers
         Association v. Schwarzenegger. Defining the
         Constitutional Perimeter Around State Regulation
         of Violent Video Games, 13 SMU SCI. & TECH. L.
         REV. 219 (2010).

         Elyse Whitney Grant, Note, Assessing the
         Constitutionality of Reproductive Technologies
         Regulation." A Bioethical Approach, 61 HASTINGS
         L.J. 997 (2010).

         Jeremiah J. Kelly, Follow-on Biologics: Legal,
         Scientific, and Policy Considerations, 13 J. HEALTH
         CARE L. & POL'Y 257 (2010).

         Phillip L. Kim, Note, When Is Enough Simply
         Enough? Shining Light On Medical Futility
         Through Bernstein v. Superior Court, 13 SMU SCI.
         & TECH. L. REV. 231 (2010).

         Yvette E. Pearson, Book Review, Chimeras,
         Hybrids, and Interspecies Research." Politics and
         Policymaking, 51 JURIMETRICS J. 105 (2010).

         J. Brad Reich & Dawn Swink, You Can't Put the
         Genie Back in the Bottle: Potential Right and
         Obligations of Egg Donors in the Cyberprocreation
         Era, 20 ALB. L.J. SCI. & TECH. 1 (2010).

         Jessica L. Roberts, Preempting Discrimination:
         Lessons from the Genetic Information
         Nondiscrimination Act, 63 VAND. L. REV. 439
         (2010).

         Jessica H. Schultz, Note, Development Of
         Ectogenesis: How Will Artificial Wombs Affect The
         Legal Status Of A Fetus Or Embryo?, 84 CHI.-KENT
         L. REV. 804 (2010).

         Robert Streiffer, Chimeras, Moral Status, and
         Public Policy." Implications of the Abortion Debate
         for Public Policy on Human/Nonhuman Chimera
         Research, 38 J.L. MED. & ETHICS 238 (2010).

         John A. Vernon et al., Exploration of Potential
         Economics of Follow-On Biologics and
         Implications for Data Exclusivity, 16 B.U.J. SCI. &
         TECH. L. 55 (2010).

         W. Nicholson Price, Am I My Son? Human Clones
         and The Modern Family, 11 COLUM. SC1. & TECH.
         L. REV. 119 (2010).

         10.5.2 Pharmaceuticals

         Timothy J. Aspinwall, Imperfect Remedies:
         Legislative Efforts to Prevent Genetic
         Discrimination, 19 ANNALS HEALTH L. 121 (2010).

         Nicole Baffi, Note, The Good, the Bad, and the
         Healthy: How Spindle-Chromosomal Complex
         Transfer Can Improve the Future, 74 ALB. L. REV.
         361 (2010-11).

         Lee Black et al., Genetic Testing, Physicians and
         the Law." Will the Tortoise Ever Catch Up with the
         Hare?, 19 ANNALS HEALTH L. 115 (2010).

         Daniel Carpenter et el., Early Entrant Protection in
         Approval Regulation: Theory and Evidence from
         FDA Drug Review, 26 J. L. ECON & ORG. 515
         (2010).

         Sarah C. Duncan, Note, Allocating Liability for
         Deficient Warnings on Generic Drugs." A
         Prescription for Change, 13 VAND. J. ENT. & TECH.
         L. 185 (2010).

         Joe Fore, Moving Beyond "Gene Doping":
         Preparing for Genetic Modification in Sport, 15 VA.
         J.L. & TECH. 76 (2010).

         Stacey B. Lee, Is a Cure on the Way?--The Bad
         Medicine of Generics, Citizen Petitions, and Noerr-Pennington
         Immunity, 20 KAN. J.L. & PUB. POL'Y
         98 (2010).

         Richard Potomac, Are You Sure You Want to Eat
         That? U.S. Government and Private Regulation of
         Domestically Produced and Marketed Dietary
         Supplements, 23 LOY. CONSUMER L. REV. 54
         (2010).

         Meera Shenoy, Note, United States v. Valdivieso
         Rodriguez: The Trend of Telemedicine, 13 SMU
         SCI. & TECH. L. REV. 239 (2010).

         Chittam Thakore, Reverse Payments From Brand-Name
         to Generic Drug Companies: Antitrust Law
         Violations or a Patentee's Rights? 43 L./TECH. no.
         1, 2010, 1.

         10.5.3 Stem Cells and Cloning

         Ronald Chester & Robert Sackstein, Embryonic
         Stem Cell-Based Therapeutics: Balancing Scientific
         Progress and Bioethics, 20 HEALTH MATRIX 203
         (2010).

         Shannon McGuire. Note, Embryonic Stein Cells."
         Marrow of the Dickey Matter, 11 J. HIGH TECH. L.
         160 (2010).

         Anne Clark Pierson, Note, Sherley V. Sebelius.
         Circuit Court Allows Federal Funding Of
         Embryonic Stem Cell Research to Continue for
         Now, 38 J.L. MED. & ETHICS 875 (2010).

         Jody Schechter, Note, Promoting Human
         Embryonic Stein Cell Research: A Comparison of
         Policies in the United States and the United
         Kingdom and Factors Encouraging Advancement,
         45 TEX. INT'L L.J. 603 (2010).

         Jenny Shum, Moral Disharmony: Human
         Embryonic Stem Cell Patent Laws, Waif and
         Public Policy, 33 B.C. INT'L & COMP. L. REV. 153
         (2010).

         10.5.4 Nanotechnology

         Scott Bomkamp, Beyond Chemicals." The Lessons
         that Toxic Substance Regulatory Reform Can Learn
         from Nanotechnology, 85 IND. L.J. SUPP. 24 (2010).

     10.6 Environmental Law

         10.6.0 General

         Nicholas J. Cicale, Note, The Clean Development
         Mechanism." Renewable Energy, Infrastructure For
         China And An Empty Promise For Africa, 26 CONN.
         J. INT'L L 253 (2010).

         Jane Kloecker, Developing a Sustainable Hardrock
         Mining and Mineral Processing Industry:
         Environmental and Natural Resource Law for
         Twenty-First Century People, Prosperity, and the
         Planet, 25 J. ENVTL. L. & LITIG. 123 (2010).

         Amanda L. Kool, Halting Pig in the Parlor Patents."
         Nuisance Law as a Tool to Redress Crop
         Contamination, 50 JURIMETRICS J. 453 (2010).

         Jay Mense, Green Technology in Pittsburgh, 2010
         PGH. J. TECH. L. & POL'Y 178 (2010).

         Darren A. Prum, Green Buildings, High
         Performance Buildings, and Sustainable
         Construction: Does It Really Matter What We Call
         Them?, 21 VILE. ENVTL. L.J. 1 (2010).

         Ray Purdy, Using Earth Observation Technologies
         for Better Regulatory Compliance and Enforcement
         of Environmental Laws, 22 J. ENVTL. L. 59 (2010).

         Sara R. Reichenauer, Issuing Violations Without
         Tangible Evidence." Computer Modeling for Clean
         Water Act Enforcement, 95 IOWA L. REV. 1011
         (2010).

         Symposium, "As If Equity Mattered" In Natural
         Resources: Toxic Inequities: Chemical Exposures
         and Indigenous Communities in Canada and the
         United States, 50 NAT. RESOURCES J. 393 (2010).

         Jorge E. Vinuales, Legal Techniques for Dealing
         with Scientific Uncertainty in Environmental
         Law, 43 VAND. J. TRANSNAT'L L. 437 (2010).

         10.6.1 Pollution

         Valerie Eifert, Collaboration Before Legislation:
         The Current State of E-Waste Laws and a Guide to
         Developing Common Threads for the State
         Patchwork Quilt, 18 PENN ST. ENVTL. L. REV. 235
         (2010).

         Liu Nengye & Frank Maes, The European Union
         and the International Maritime Organization: EU's
         External Influence on the Prevention of Vessel-Source
         Pollution, 41 J. MAR. L & COM. 581 (2010).

         Michael T. Poulton, Particles of What? A Call for
         Specificity in Airborne Particulate Regulation, 51
         JURIMETR1CS J. 61 (2010).

         10.6.2 Hazardous Substances

         Conrad Benedetto, Comment, Is the European
         Laboratory Over-reach-ing? The Experimentation,
         Reaction and Product Yielded by the European
         Union's Registration, Evaluation, and
         Authorization of Chemicals, 21 VILL. ENVTL. L.J.
         75 (2010).

         Hannah G. Elisha, Note, Addressing the E-Waste
         Crisis: The Need for Comprehensive Federal E-Waste
         Regulation within the United States, 14
         CHAP. L. REV. 195 (2010).

         Aaron Ezroj, How the European Union's Weee &
         Rohs Directives Can Help the United States
         Develop a Successful National E-Waste Strategy, 28
         VA. ENVTL. L.J. 45 (2010).

         Yoshiko Naiki, Assessing Policy Reach. Japan's
         Chemical Policy Reform in Response to the EU's
         Reach Regulation, 22 J. ENVTL. L. 171 (2010).

         10.6.3 Electromagnetic Fields

         10.6.4 Nuclear Technology

         Louis J. Sirico, Jr. Stopping Nuclear Power Plants."
         a Memoir, 21 VILL. ENVTL. L.J. 35 (2010).

         Ben Schifinan, Note, The Limits of NEPA:
         Consideration of the Impacts of Terrorism in
         Environmental Impact Statements for Nuclear
         Facilities, 35 COLUM. J. ENVTL. L. 373 (2010).

         10.6.5 Energy and the Environment

         Sara C. Bronin, Curbing Energy Sprawl With
         Microgrids, 43 CONN. L. REV. 547 (2010).

         Allison S. Clements & Douglass D. Sims, A Clean
         Energy Deployment Administration: The Right
         Policy for Emerging Renewable Technologies, 31
         ENERGY L. J. 397 (2010).

         Domenic A. Cossi, Getting Our Priorities Straight:
         Streamlining NEPA To Hasten Renewable Energy
         Development On Public Land, PUB. LAND &
         RESOURCES L. REV., 2010, at 149.

         Lincoln L. Davies, Alternative Energy and the
         Energy-Environment Disconnect, 46 IDAHO L. REV.
         473 (2010).

         Timothy P. Duane, Greening The Grid in
         California, 25 NAT. RESOURCES & ENV'T 31
         (2010).

         Joel B. Eisen, Symposium on Urban Development in
         the 21st Century: Can Urban Solar Become a
         "Disruptive" Technology?: The Case For Solar
         Utilities, 24 ND J. L. ETHICS & PUB POL'Y 53
         (2010).

         Jody M. Endres, Clearing the Air." the Meta-Standard
         Approach to Ensuring Biofuels
         Environmental and Social Sustainability, 28 VA.
         ENVTL. L.J. 73 (2010).

         Steven Ferrey, The Failure of International Global
         Warming Regulation to Promote Needed Renewable
         Energy, B.C. ENVTL. AFF. L. REV. 67 (2010).

         Joshua P. Fershee, Comment, The Future of Energy
         Policy: A National Renewable Portfolio Standard."
         Moving Power Forward." Creating a Forward-Looking
         Energy, 42 CONN. L. REV. 1405 (2010).

         Jamie E. France, Note, A Proposed Solar Access
         Law for the State of Texas, 89 TEX. L. REV. 188
         (2010).

         Lydia Gonzalez Gromatzky & Peter T. Gregg,
         Carbon Storage." Texas Stakes Its Claim, 25 NAT.
         RESOURCES & ENV'T 21 (2010).

         David R. Hodas, Deepwater Drilling and Least-Cost
         Energy Decision Making, 25 NAT. RESOURCES
         & ENV'T 55 (2010).

         Lise Johnson, International Climate Change
         Mitigation And Adaptation Post-Copenhagen."
         Advocacy Strategies for Promoting Greater
         Consideration of" Climate Change and Human
         Rights in Development Activities." The Case of the
         West Seti Hydroelectric Project in Nepal, 27 PACE
         ENVTL. L. REV. 511, (2010).

         Elizabeth Ann Kronk, Alternative Energy
         Development in Indian Country: Lighting the Way
         for the Seventh Generation, 46 IDAHO L. REV. 449
         (2010).

         Alfred R. Light, Reducing Nutrient Pollution In The
         Everglades Agricultural Area Through Best
         Management Practices, 25 NAT. RESOURCES &
         ENV'T 26 (2010).

         Crystal D. Masterson, Comment, Wind-Energy
         Ventures in Indian Country." Fashioning a
         Functional Paradigm, 34 AM. L. REV. 317 (2009-10).

         Chris Millen, Clean Cloud Computing, 2010 PGH.
         J. TECH. L. & POL'Y 1 (2010).

         William A. Mogel, Book Review, Smart Power:
         Climate Change, The Smart Grid and the Future of
         Electric Utilities, 31 ENERGY L. J. 183 (2010).

         Jacqueline R. Papez, Comment, Native
         (Hydro)power: Alternate Avenues for Achieving
         Native Control of Natural Resources on Tribal
         Lands, with Focus on Hydropower Dams, 46 IDAHO
         L. REV. 671 (2010).

         Bruce D. Ray, Are Green Homes Really Safer?,24
         NAT. RESOURCES & ENV'T 48 (2010).

         Arnold W. Reitze, Jr., The Clean Air Act at a
         Crossroads." Turning 40, Confronting Climate
         Change: Symposium Article: Federal Control of
         Greenhouse Gas Emissions, 40 ENVTL. L. 1261
         (2010).

         Gregory J. Rigano, Note, The Solution To The
         United States' Energy Troubles Is Blowing In The
         Wind, 39 HOFSTRA L. REV. 201 (2010).

         Jim Rossi, The Future of Energy Policy." A National
         Renewable Portfolio Standard." The Limits of a
         National Renewable Portfolio Standard, 42 CONN.
         L. 1425 (2010).

         Peter J. Schaumberg & Ami M. Grace-Tardy, The
         Dawn of Federal Marine Renewable Energy
         Development, 24 NAT. RESOURCES & ENV'T 15
         (2010).

         David M. Smolin, The Paradox of the Future In
         Contemporary Energy Policy: A Human Rights
         Analysis, 40 CUMB. L. REV. 135 (2010).

         David B. Spence, Commentary, The Future of
         Energy Policy: A National Renewable Portfolio
         Standard." The Political Barriers to a National RPS,
         42 CONN. L. REV. 1451 (2010).

         Symposium, Transportation Energy Policy In
         National And Global Perspective." A New
         Beginning?: Struggling Past Oil: The Infrastructure
         Impediments To Adopting Next-Generation
         Transportation Fuel Sources, 40 CUMB. L. REV. 87
         (2010).

         Symposium, Transportation Energy Policy In
         National And Global Perspective." A New
         Beginning?: transporting India Into A New Climate,
         40 CUMB. L. REV. 119 (2010).

         Amy J. Wildermuth, Is Environmental Law A
         Barrier to Emerging Alternative Energy Sources?,
         46 IDAHO L. REV. 509, 511 (2010).

         Olivia Wooley, Note, Trouble on the Horizon?
         Addressing Place-Based Values in Planning for
         Offshore Wind Energy, 22 J. ENVTL. L. 223 (2010).

         Michael W. Yackira, Comment, Smart Grid
         Technology." The Future of the Electric Utility
         Industry, 44 U. RICH. L.R. 1145 (2010).

         10.6.6 lnternational Environmental Law Developments

         Philip S. Pulitzer, Note, Trading in the Carbon
         Market: Leveling the Playing Field in Sustainable
         Investment, 33 SUFFOLK TRANSNAT'L L. REV. 113
         (2010).

     10.7 Television

         10.7.0 General

         Katherine Neifeld, Note, More Than a Minor
         Inconvenience. The Case ,for Heightened Protection
         for Children Appearing on Reality Television, 32
         HASTINGS COMM. & ENT. L.J. 447 (2010).

         Jennifer L. Pomeranz, Television Food Marketing to
         Children Revisited." The Federal Trade Commission
         Has the Constitutional and Statutory Authority to
         Regulate, 38 J.L. MED. & ETHICS 98 (2010).

         10.7.1 Satellite Television

         Elizabeth A. Pike, Indecency, A La Carte, and the
         FCC's Approval of the Sirius XM Satellite Radio
         Merger: How the FCC Indirectly Regulated
         Indecent Content on Satellite Radio at the Expense
         of the "Public Interest, " 18 U. MIAMI BUS. L. REV.
         221 (2010).

         10.7.2 Cable Television

         Peter Hamner, Note, Be Kind, Please Rewind-The
         Second Circuit Gives Cable Providers Something to
         Watch in Cartoon Network L.P.v. CSC Holdings,
         Inc., 17 VILE. SPORTS & ENT. L.J. 135 (2010).

     10.8 Telecommunications

         10.8.0 General

         Patrick M. Garry, Media And The Law Symposium.
         When Does Government Regulation Go Too Far?:
         Essay: Re-Evaluating Media Regulation In A Media
         Environment Of Nearly Unlimited Entertainment
         Programming And Ample Alternative Channels Of
         Communication+, 22 REGENT U.L. REV.
         347 (2009/2010).

         Elanor A. Mangin, Market Access in China-Publications
         and Audiovisual Materials." A Moral
         Victory With a Silver Lining, 25 BERKELEY TECH.
         L.J. 279 (2010).

         Peggy Valcke & Marieke Lenaerts, Who's Author,
         Editor and Publisher in User-Generated Content?
         Applying Traditional Media Concepts to UGC
         Providers, 24 INT'L REV. LAW, COMP. & TECH. 119
         (2010).

         Thipsurang Vathitphund, Access to Knowledge
         Difficulties in Developing Countries: A Balanced
         Access to Copyrighted Works in the Digital
         Environment, 24 INT'L REV. LAW, COMP. & TECH.
         7 (2010).

         A. Starkey De Soto, Comment, Intextication: Txting
         Whl Drvng. Does the Punishment Fit the Crime?,
         32 HAWAII L. REV. 359 (2010).

         10.8.1 Telephone

         Sean L. McLaughlin, Comment, Controlling Smart-Phone
         Abuse." The Fair Labor Standards Act's
         Definition of Work in Non-Exempt Employee
         Claims for Overtime, 58 U. KAN. L. REV. 737
         (2010).

         Daniel Zamani, Note, There 'S an Amendment for
         That: A Comprehensive Application of Fourth
         Amendment Jurisprudence to Smart Phones, 38
         HASTINGS CONST. L.Q. 169 (2010).

         10.8.2 Multimedia in Telecommunications

         Ann Riley, Reducing the Digital Divide: The 21st
         Century Communications and Video Accessibility
         Act, 2010 PGH. J. TECH. L. & POL'Y 160 (2010).

         10.8.3 International Telecommunications Developments

     10.9 Recording Industry

         Nolan Garrido, Contemporary And Historical Comparison
         Of American And Brazilian Legal Efforts To Corral
         Digital Music Piracy And P2p Software, 16 ILSA J INT'L
         & COMP. L. 675 (2010).

     10.10 Broadband

         Mark Conrad, The New Paradigm .for American
         Broadcasting--Changing the Content Regulation
         Regimen in the Age of New Media, 24 INT'L REV. LAW,
         COMP. & TECH. 241 (2010).

11. FAMILY LAW

         Terri Day, The New Digital Dating Behavior--Sexting." Teens'
         Explicit Love Letters: Criminal Justice or Civil Liability, 33
         HASTINGS COMM. & ENT. L.J. 69 (2010).

         Jordan J. Szymialis, Note, Sexting." A Response to Prosecuting
         Those Growing Up with a Growing Trend, 44 IND. L. REV. 301
         (2010).

12. OTHER

         Paul Bernal, Collaborative consent. Harnessing the Strengths of
         the Internet for Consent in the Online Environment, 24 INT'L
         REV. LAW, COMP. & TECH. 287 (2010).

         Dorothy A. Harbeck & Yoonji Kim, Is The Internet
         "Voodoo"?: Evidentiary Weight of Internet-Based Material in
         Immigration Court, 10 CONN. PUB. INT. L.J. 1 (2010).

         Linfong Tzeng, Follow-on Biologics, Data Exclusivity, and the
         FDA, 25 BERKELEY TECH. L.J. 135 (2010).

         Casey Unwin, No Longer the Right to Remain Silent."
         Cross-examining Forensic Analyst Testimony,
         2010 B.Y.U.L. REV. 1025 (2010).

         Matthew T. Wholey, Note, The Internet Is for Discrimination:
         Practical Difficulties and Theoretical Hurdles Facing the Fair
         Housing Act Online, 60 CASE W. RES. L. REV. 491 (2010).
COPYRIGHT 2011 Rutgers University School of Law - Newark
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2011 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Rutgers Computer & Technology Law Journal
Article Type:Bibliography
Date:Mar 22, 2011
Words:17850
Previous Article:Personalized genomics: a need for a fiduciary duty remains.
Next Article:I can do bad all by myself: a proposal for streamlining the claim construction process in patent litigation.
Topics:

Terms of use | Privacy policy | Copyright © 2022 Farlex, Inc. | Feedback | For webmasters |