Spring 2017 Notes & Comments Competition Winners

Earlier this year, BTLJ invited J.D. candidates from around the country to submit comments on topics at the … Continue Reading

Volume 31, Issue 2

COMPLETE VOLUME 31, ISSUE 2 Complete Issue FRONT MATTER Front Matter ARTICLES Functionality and Expression in Computer Programs: … Continue Reading

Alexa – Can You Give Me Some Privacy?

Alexa – Can You Give Me Some Privacy? By: Erica Sun “Alexa, tell me what the weather is … Continue Reading

Deterring Cybercrime: The Focus on Intermediaries

Aniket Kesari[1] Amanda Maya[2] Chris Hoofnagle[3] Damon McCoy[4] Precis for Platform Law: Public and Private Regulation of Online … Continue Reading

The CFAA and You(r Cat Feeder)

Chante Westmoreland (JD Candidate ’18) interviews Jamie Williams of the Electronic Frontier Foundation. Jamie discusses how the Computer Fraud … Continue Reading

Who Wouldn’t Want a Digital Butler?

Maurice E. Stucke & Ariel Ezrachi Personal digital assistants are alluring. Many of us already benefit from basic digital … Continue Reading

Nicole Ozer, BTLJ Alumni

1) What brought you to law school? I wanted to be at the vanguard of lawyers working at … Continue Reading

Is the DTSA Toothless?

Is the DTSA Toothless? Early DTSA cases and ex parte seizure By: Drew Schmidt Congress passed the Defend … Continue Reading

To Have and To Own

Chante Westmoreland (J.D. Candidate ’18) interviews Associate Dean and Professor, Molly Van Houweling about her path to Berkeley … Continue Reading

Bug Bounty Programs as a Corporate Governance “Best Practice” Mechanism

By Amit Elazari Bar On, Adv., LL.M., Doctoral Law Student (J.S.D.), UC Berkeley School of Law, CTSP Fellow, … Continue Reading