{"title":"GasFrac: A Cost-Benefit Analysis of Hydraulic Fracturing with Liquified Petroleum Gas Gel","authors":"B. Wilson","doi":"10.5195/TLP.2013.137","DOIUrl":"https://doi.org/10.5195/TLP.2013.137","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131142095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Give Me Your PASSWORD because Congress Can Say So: An Analysis of Fifth Amendment Protection Afforded Individuals Regarding Compelled Production of Encrypted Data and Possible Solutions to the Problem of Getting Data from Someone’s Mind","authors":"M. Wachtel","doi":"10.5195/TLP.2013.132","DOIUrl":"https://doi.org/10.5195/TLP.2013.132","url":null,"abstract":"This site is published by the University Library System of the University of Pittsburgh as part of its DScribe Digital Publishing Program and is cosponsored by the University of Pittsburgh Press. Give Me Your Password Because Congress Can Say So: An Analysis of Fifth Amendment Protection Afforded Individuals Regarding Compelled Production of Encrypted Data and Possible Solutions to the Problem of Getting Data from Someone’s Mind","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction: Law, Technology, and Energy in Pittsburgh","authors":"Jeffrey Roberts, Matthew Brouse","doi":"10.5195/TLP.2013.133","DOIUrl":"https://doi.org/10.5195/TLP.2013.133","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126562303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fighting the Good Fight: Why the So-Called “War on Coal” is Beneficial for Pittsburgh’s Future","authors":"James G. Lee","doi":"10.5195/TLP.2013.135","DOIUrl":"https://doi.org/10.5195/TLP.2013.135","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128886605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crossing the Line: Selective Licensing of Liquefied Natural Gas Exportation Facilities is Unconstitutional","authors":"R. Kennedy","doi":"10.5195/TLP.2013.136","DOIUrl":"https://doi.org/10.5195/TLP.2013.136","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Being Social: Why the NCAA Has Forced Universities to Monitor Student-Athletes’ Social Media","authors":"J. Hopkins, K. Hopkins, B. Whelton","doi":"10.5195/TLP.2013.116","DOIUrl":"https://doi.org/10.5195/TLP.2013.116","url":null,"abstract":"On June 21, 2011, the National Collegiate Athletic Association (NCAA) charged the University of North Carolina at Chapel Hill (UNC) with a number of NCAA legislation violations, including “not adequately and consistently monitor[ing] social networking activity that visibly illustrated potential amateurism violations within the football program[.]” While the NCAA’s bylaws regarding member institution conduct indirectly impacts social media oversight, the NCAA’s lack of a social media monitoring policy creates uncertainty as to how member institutions should deal with potential violations of a non-existing policy. Coupled with concerns about their public image, tort liability, and their student-athletes’ safety, NCAA member institutions must develop a social media monitoring policy that does not infringe on constitutional free speech rights or more specific social media privacy laws. Ultimately, monitoring publicly available social media might be the safest and the best way to protect the institutions’ interests without violating their student-athletes’ legal rights. Normal 0 false false false EN-US JA X-NONE /* Style Definitions */ \u0000 table.MsoNormalTable \u0000 {mso-style-name:\"Table Normal\"; \u0000 mso-tstyle-rowband-size:0; \u0000 mso-tstyle-colband-size:0; \u0000 mso-style-noshow:yes; \u0000 mso-style-priority:99; \u0000 mso-style-parent:\"\"; \u0000 mso-padding-alt:0in 5.4pt 0in 5.4pt; \u0000 mso-para-margin:0in; \u0000 mso-para-margin-bottom:.0001pt; \u0000 mso-pagination:widow-orphan; \u0000 font-size:12.0pt; \u0000 font-family:\"Cambria\",\"serif\"; \u0000 mso-ascii-font-family:Cambria; \u0000 mso-ascii-theme-font:minor-latin; \u0000 mso-hansi-font-family:Cambria; \u0000 mso-hansi-theme-font:minor-latin;}","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124643460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Masthead & General Information","authors":"J. Jtlp","doi":"10.5195/TLP.2013.125","DOIUrl":"https://doi.org/10.5195/TLP.2013.125","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123554854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ill Suited to the Digital Age: Fourth Amendment Exceptions and Cell Site Location Information Surveillance","authors":"Michael T.E. Kalis","doi":"10.5195/tlp.2013.120","DOIUrl":"https://doi.org/10.5195/tlp.2013.120","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Proper Basis for Exercising Jurisdiction in Internet Disputes: Strengthening State Boundaries or Moving Towards Unification?","authors":"Niloufer Selvadurai","doi":"10.5195/TLP.2013.124","DOIUrl":"https://doi.org/10.5195/TLP.2013.124","url":null,"abstract":"Normal 0 false false false EN-AU JA X-NONE Normal 0 false false false EN-AU JA X-NONE /* Style Definitions */ \u0000 table.MsoNormalTable \u0000 {mso-style-name:\"Table Normal\"; \u0000 mso-tstyle-rowband-size:0; \u0000 mso-tstyle-colband-size:0; \u0000 mso-style-noshow:yes; \u0000 mso-style-priority:99; \u0000 mso-style-parent:\"\"; \u0000 mso-padding-alt:0in 5.4pt 0in 5.4pt; \u0000 mso-para-margin-top:0in; \u0000 mso-para-margin-right:0in; \u0000 mso-para-margin-bottom:10.0pt; \u0000 mso-para-margin-left:0in; \u0000 line-height:115%; \u0000 mso-pagination:widow-orphan; \u0000 font-size:11.0pt; \u0000 font-family:\"Calibri\",\"sans-serif\"; \u0000 mso-ascii-font-family:Calibri; \u0000 mso-ascii-theme-font:minor-latin; \u0000 mso-hansi-font-family:Calibri; \u0000 mso-hansi-theme-font:minor-latin; \u0000 mso-ansi-language:EN-AU;} \u0000 Private international law has developed on the premise of geographically discrete areas that could be effectively governed by nations with clear and delineated boundaries. The nature of internet communications however dissects and transcends national boundaries. In such a landscape of technological evolution, it is necessary to design new technologically-neutral principles for determining internet jurisdiction. While there is widespread agreement on the nature of the challenge posed by internet jurisdiction, there is significant divergence in the solutions proposed. The proposed solutions range from strengthening existing jurisdiction rules, to developing the present jurisdiction rules, to creating a new language of jurisdictional basis for the determination of internet disputes. After a consideration of the merits of the various veins of scholarship on this complex issue, it is recommended that the movement to unification through international convention provides the most effective solution to achieve consistency and certainty in the determination of jurisdiction in internet disputes.","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smartphone Wars: Emphasizing eBay's First Two Factors in Smartphone Patent Injunctions","authors":"Christianna Edrington","doi":"10.5195/tlp.2013.117","DOIUrl":"https://doi.org/10.5195/tlp.2013.117","url":null,"abstract":"","PeriodicalId":185385,"journal":{"name":"Pittsburgh Journal of Technology Law & Policy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}