The Stored Communications Act poses an increasing threat to criminal defendants’ ability to access evidence. This Note analyzes pathways criminal defendants can pursue to access evidence within the ...
Antitrust theory portrays data privacy as a factor, like quality, that improves with competition. This Essay argues that view, though not inaccurate, is incomplete. It offers a new account of how data ...
Current First Amendment doctrine permits courts to judge a claimant’s religious sincerity in a free-exercise suit but prohibits them from adjudicating religious questions. This Note challenges that ...
Antitrust analysis generally assumes that firms seek profit, but that assumption does not always hold. This Feature offers an antitrust framework for analyzing non-profit-maximizing conduct—like ...
In this series of Tributes to Justice David H. Souter, three of his law clerks—Judge Jesse M. Furman, President Heather K. Gerken, and Professor Jeannie Suk Gersen—reflect upon and honor their former ...
Younger v. Harris is canonical in the field of federal courts, but its origins remain largely unknown. Examining diverse sources, this Article reconstructs that story. In doing so, this Article ...
Younger v. Harris is canonical in the field of federal courts, but its origins remain largely unknown. Examining diverse sources, this Article reconstructs that story. In doing so, this Article ...
In the state constitutional conventions of the Reconstruction South, biracial coalitions of delegates constitutionalized universal public-school systems ...
Previous scholarship has analyzed a host of innovation institutions—including patents, prizes, and grants—but has overlooked government-conducted ...
Younger v. Harris is canonical in the field of federal courts, but its origins remain largely unknown. Examining diverse sources, this Article ...
abstract. Each day, the news brings stories of military attacks on schools, hospitals, apartment buildings, electrical facilities, and other critical civilian infrastructure. The militaries attacking ...
abstract. Increasingly, automated processes—under the catch-all term “artificial intelligence” (AI)—serve as “mechanical managers” in the workplace. They may manifest as productivity applications to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results