By: Etahjayne Harris, “Virtual Reality (VR) is the use of computer technology to create a simulated environment. Unlike traditional user interfaces, VR places the user inside an experience.” With virtual technology, a user can be transported to a destination of their choice in an instant. Today, virtual reality is increasingly becoming part of our actual
By: Hsiao-Han Wang, The term “smart contract” refers to “the use of computer code to articulate, verify and execute an agreement between parties.” Unlike traditional contracts, smart contracts are written in codes, stored on distributed ledgers (like a database that can store all sorts of information) and secured by cryptographic keys, which make them immutable
By: Kathleen Pulver, Social media has changed the face of the legal landscape as we know it. As of 2015, nearly two-thirds of American adults were using social media.  The percentage is even higher among young adults, reaching an outstanding 90%.  It is now commonplace to see warrants appear in cases for
By: Genevieve de Guzman, Wearable technology is not new to the world of action and science fiction movies, but this technology has developed from being mere speculation to having real-world possibilities. As technology becomes an increasingly integral part of people’s daily lives, it seems an inevitability that it also becomes increasingly integrated with our physical
By: Nicole Desbois, Uber’s 100 million-dollar settlement agreement with its drivers was just recently rejected by a federal Judge in California. The Judge rejected the lawsuit claiming 100 million wasn’t enough to adequately settle the dispute. The issue is whether Uber drivers are contractors or employees entitled to benefits: making Uber venerable to state penalties.
By: Ellie Faust, During Donald Trump’s campaign, he certainly had an opinion regarding cyber security, but his opinions have been pretty inconsistent. While the president-elect vowed to protect the nation’s networks against foreign spies and criminals, he also encouraged Russian hackers to distribute emails stolen from Democratic nominee, Hillary Clinton. While we do not know
By: Victoria Linney, Yik Yak is a popular app among many college and university students. The app is a location-based network that helps people connect with others around them. However, the app differs from Twitter and Facebook in that users are able to post on the app anonymously and must be within a certain radius
May 16, 2016 Dear Readers, The Richmond Journal of Law and Technology is proud to present its fourth and final issue of the Twenty-Second Volume. At its inception in 1995 JOLT became the first law review to be published exclusively online. From this moment on, the Journal has continued to set trends in legal scholarship.
BDM Publication Version PDF Cite as: Hilary G. Buttrick et al.,The Skeleton of A Data Breach: The Ethical and Legal Concerns, 23 Rich. J.L. & Tech. 2 (2016), http://jolt.richmond.edu/wp-content/uploads/volume23_article2_Buttrick.pdf. Hilary G. Buttrick,* Jason Davidson,** Richard J. McGowan*** Introduction  After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of
Sem Publication Version PDF Daniel S. Sem* Cite as: Daniel S. Sem, Co-Developing Drugs with Indigenous Communities: Lessons from Peruvian Law and the Ayahuasca Patent Dispute, 23 Rich. J.L. & Tech. 1 (2016), http://jolt.richmond.edu/2016/12/02/volume23_issue1_sem. I. Introduction  This paper will examine the issues surrounding the co-development of drugs derived from traditional medicines used by indigenous