- The boundaries of boundless cell phone searches at the border
- Parkland shooting survivors: “thoughts and prayers” no longer enough
- Unlock the source of your greatness…at a dangerous cost
- The right to fight: Trump and the military transgender ban
- No quick fix: finding a remedy for the American heroin epidemic.
Technology and the Law
Examining the intersection of technology and the law, particularly focusing on the legal implications of technological developments.
“Can you hear me now? Good!” is perhaps one of the most recognizable quotes from a Verizon Wireless television commercial which advertises the extent and reliability of its cell phone coverage, but cell phone companies are providing more than just reliable service for their customers ...[Continue Reading]
The Facebook “like” feature allows users to click a thumbs up icon attached to posts, pictures, links, and pages. By clicking this “like” button, users can “like” pages of companies, political candidates and even candidates in a cutest baby contest. But is a Facebook “like” an ...[Continue Reading]
One social networking site, Pinterest, allows its users to share photos of Do-It-Yourself crafts and the like. These photos are then “pinned” by other Pinterest account holders to their personal virtual bulletin board for all to see and “re-pin.” In February 2012, Business ...[Continue Reading]
With each new generation of the iPhone or the release of a new Android application, the capabilities of cell phones and the information they can store increase exponentially. In a time of ever-growing technology and intense competition for a piece of the market share, even the “dumbest” of ...[Continue Reading]
In 1977, the United States Supreme Court in Bates v. Arizona State Bar held lawyers have a right to advertise their services. However, this right is subject to additional rules and regulations. In North Carolina legal advertisements must conform to the North Carolina State Bar’s Rules of ...[Continue Reading]
Protect your password. Don’t share it with anyone. Make it complicated so no one can guess it randomly. We do these things because our passwords safeguard our financial and personal worlds. We have passwords for our bank accounts, email, smart phones, and computers. We even have ...[Continue Reading]