On VEP: Regulatory Inefficiencies in Cybersecurity

On VEP: Regulatory Inefficiencies in Cybersecurity

In April 2017, anonymous hackers calling themselves “The Shadow Brokers” released a set of the National Security Agency’s hacking tools, called exploits, onto the internet….

Read Article →
Information Privacy and Data Security Laws: An Ineffective Regulatory Framework

Information Privacy and Data Security Laws: An Ineffective Regulatory Framework

Ever since advertising firms began capitalizing on private consumer information, the unjustified collection and misuse of sensitive personal data have increasingly become growing national concerns….

Read Article →
Matal v. Tam: Evolving Standards of Government Speech in the Music Industry

Matal v. Tam: Evolving Standards of Government Speech in the Music Industry

“Sorry if we try too hard / To take some power back for ours / The language of oppression / Will lose to education /…

Read Article →
Taking a Knee For First Amendment Rights: Free Speech Precedent for NFL Players

Taking a Knee For First Amendment Rights: Free Speech Precedent for NFL Players

Athletes of the National Football League have recently displayed a strong sense of solidarity in combating police brutality by linking arms and kneeling during the…

Read Article →
Funding Churches after Hurricane Harvey: A First Amendment Analysis

Funding Churches after Hurricane Harvey: A First Amendment Analysis

Starting on August 25, 2017, Hurricane Harvey pummeled through the south-eastern region of Texas. Those who were displaced flocked to welcoming organizations and nonprofits which…

Read Article →
Technological Self-Incrimination: The Precedent of Biometric Unlocking

Technological Self-Incrimination: The Precedent of Biometric Unlocking

In September 2013, Apple unveiled Touch ID: a mechanism that allows a user to unlock his or her iPhone using a fingerprint.[1] Since the unveiling…

Read Article →
Campaign Finance in the Past 40 Years: An Overview

Campaign Finance in the Past 40 Years: An Overview

On April 2nd, 2014 the Supreme Court handed down a decision that was met with a wide variety of reactions, from support to disinterest to deeply…

Read Article →
International Cybersecurity: A Call for Legislation

International Cybersecurity: A Call for Legislation

The beginnings of a new international conflict began to brew last summer, after the release of several private emails and confidential documents of members of…

Read Article →
The Trans-Pacific Partnership in Perspective: Examining Challenges and Implications

The Trans-Pacific Partnership in Perspective: Examining Challenges and Implications

The Trans-Pacific Partnership (TPP), a groundbreaking new agreement raises a set of new legal challenges in the realm of global trade. The TPP is both…

Read Article →
How Should We Define a Refugee?

How Should We Define a Refugee?

The continued influx of Central-Americans at the U.S.-Mexico border poses the most recent challenge to international refugee law. The common meaning of the word “refugee”…

Read Article →
Repeal Rule 413 of the Federal Rules of Evidence

Repeal Rule 413 of the Federal Rules of Evidence

The Admissibility of Evidence of Prior Sex Offenses This article was originally published in the Fall 2012 issue of the Columbia Undergraduate Law Review. On…

Read Article →