388 research outputs found

    Right of First Refusal and the Package Deal

    Get PDF
    A persistent problem in right-of-first-refusal jurisprudence has been the effect of an acceptable third-party offer for a package of properties, a portion of which is burdened. In determining the effect of such package deals, courts have primarily relied on principles related to the nature and operation of rights of first refusal. Unfortunately, this approach has led different courts to reach disparate and inconsistent results.The problems posed by the package deal, of course, could be remedied by the parties themselves through a provision addressing the effect of such a transaction on the rightholder\u27s privilege. The provision would answer whether the package deal is to trigger the right of first refusal, and if so, whether the rightholder would be allowed to exercise her privilege on the burdened portion alone or on the entire package. There is, however, every indication that in many circumstances, the costs of agreeing to a provision addressing the somewhat remote possibility of a dispute arising out of a package deal will outweigh its benefits. As a result, parties to right-of-first-refusal agreements will continue to omit a provision addressing the possibility of a package deal. Therefore, a consistent and uniform judicial treatment of the package deal is desirable. The most appropriate solution is for the courts to adopt a default rule that would apply to all instances of the package deal, unless the parties to a right-of-first-refusal agreement contracted around the rule explicitly. In terms of fairness and efficiency, the most appropriate default rule is to require an owner who receives an acceptable offer for a package deal to provide the rightholder with an opportunity to purchase the burdened portion of the package at a reasonable price. If the owner fails to do so, the rightholder should be entitled to enforce her privilege by purchasing the burdened property at a price determined by the court to be fair and reasonable

    A methodological approach for comparing waste water effluent's regulatory and management frameworks based on sustainability assessment

    Get PDF
    Abstract The availability of deterministic models to achieve information regarding the main aspects affected by the implementation of regulations is of high importance for supporting decision-makers and policymaking. This is particularly true and of crucial importance when pursuing more sustainable development. The present study proposes a triple bottom integrated model for the evaluation of the main aspects of sustainability —environmental, social, and economic— based on an integrated sustainability index. The model was applied for comparing the wastewater regulatory systems implemented in Italy and Israel. The main results show that greenhouse gas emissions were about 0.60 kgCO2eq/m3 for Israel and about 0.07 kgCO2eq/m3 for Italy. Concerning freshwater eutrophication, the emissions related to the Italian scenarios ranged from about 2x10-3 kgPeq/m3 to 1.2x10-2 kgPeq/m3 for use on soil and discharge to river, respectively. For Israel, the same figures resulted 6x10-3 kgPeq/m3 and 1x10-3 kgPeq/m3, respectively. The impact on human health ranged from 0.5x10-5 DALY to 1.56x10-4 DALY depending on the emission limits and final destination. A comprehensive figure of sustainability was calculated by the proposed integrated sustainability index. The higher was this index the lower was the sustainability. Results for "discharge to river" were 8.91 for Israel and 9.15 for Italy whereas for "reuse on soil" the index was 24.7 for Israel and 19.9 for Italy. The methodological approach presented in this paper can be implemented to measure and enhance sustainability performance in water sectors, as well as in other environmental fields

    The Overlapping Web of Data, Territoriality and Sovereignty

    Get PDF
    Provides a framework to better understand Global Legal Pluralism and the current international state of law. Equips practitioners, theorists, and students with deeper insights and analytical tools to describe the conflict among legal and quasi-legal systems. Analyzes global legal pluralism in light of legal theory, constitutionalism, conflict of laws, international law, commercial transactions, and as it affects indigenous polities, religious orders, and citizenship.https://digitalcommons.wcl.american.edu/facsch_bk_contributions/1288/thumbnail.jp

    Borders and Bits

    Get PDF
    Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of the highly contested and often conflicting approaches to the jurisdictional reach of law enforcement over data, the so-called right to be forgotten, and a range of other privacy regulations-engaging in an in-depth analysis as to how these issues are playing out across both Europe and the United States. In so doing, the Article highlights the flaws with the straightforward application of old jurisdictional rules onto the new medium of data-taking on recent scholarship on this issue. And it shines a spotlight on the unilateral rulemaking by powerful states and the powerful multinational companies that manage our data, which in turn puts private, multinational companies increasingly in control of whose rules govern and thus the substance of both privacy and speech rights on a global, or near-global, basi

    Microsoft Ireland, the CLOUD Act, and International Lawmaking 2.0

    Get PDF
    On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world\u27s data

    Access to Data Across Borders: The Critical Role for Congress to Play Now

    Get PDF

    Hamdan v. United States: A Death Knell for Military Commissions?

    Get PDF
    In October 2012, a panel of the D.C. Circuit dealt a blow to the United States’ post- September 11, 2001 decade-long experiment with military commissions as a forum for trying Guantanamo Bay detainees. Specifically, the court concluded that prior to the 2006 statutory reforms, military commission jurisdiction was limited to violations of internationally-recognized war crimes; that providing material support to terrorism was not an internationally-recognized war crime; and that the military commission conviction of Salim Hamdan for material support charges based on pre-2006 conduct was therefore invalid. Three months later, a panel of the D.C. Circuit reached the same conclusion with respect to conspiracy and solicitation charges, and vacated the conviction and life sentence of Guantanamo Bay detainee Ali Hamza Ahmad al Bahlul. That case is now on appeal to an en banc (full court) panel of the D.C. Circuit. This article analyses the D.C. Circuit’s ruling in Hamdan’s case, explaining why the ultimate holding is the right one, even though some of the reasoning is flawed, and why the ruling should be upheld on appeal. It also highlights the many unresolved questions and the implications for the future of military commissions at Guantanamo Bay. As the article explains, the D.C. Circuit’s rulings are a major victory for the rule of law and a major defeat for commissions

    Pre-Crime Restraints: The Explosion of Targeted, Noncustodial Prevention

    Get PDF
    This Article exposes the ways in which noncustodial pre-crime restraints have proliferated over the past decade, focusing in particular on three notable examples — terrorism-related financial sanctions, the No Fly List, and the array of residential, employment, and related restrictions imposed on sex offenders. Because such restraints do not involve physical incapacitation, they are rarely deemed to infringe core liberty interests. Because they are preventive, not punitive, criminal law procedural protections do not apply. They have exploded largely unchecked — subject to little more than bare rationality review and negligible procedural protections — and without any coherent theory as to their appropriate limits. The Article examines this category of noncustodial pre-crime restraints as a whole and develops a framework for evaluating, limiting, and legitimizing their use. It accepts the preventive frame in which they operate but argues that in some instances, noncustodial restraints can so thoroughly constrain an individual’s functioning that they are equivalent to de facto imprisonment and ought to be treated as such. Even in the more common case of partial restraints, enhanced substantive and procedural safeguards are needed to preserve the respect for individuals’ equal dignity, freedom of choice, and moral autonomy at the heart of the liberty interest that the Constitution and a just society protect

    The Un-Territoriality of Data

    Get PDF
    Territoriality looms large in our jurisprudence, particularly as it relates to the government’s authority to search and seize. Fourth Amendment rights turn on whether the search or seizure takes place territorially or extraterritorially; the government’s surveillance authorities depend on whether the target is located within the United States or without; and courts’ warrant jurisdiction extends, with limited exceptions, only to the borders’ edge. Yet the rise of electronic data challenges territoriality at its core. Territoriality, after all, depends on the ability to define the relevant “here” and “there,” and it presumes that the “here” and “there” have normative significance. The ease and speed with which data travels across borders, the seemingly arbitrary paths it takes, and the physical disconnect between where data is stored and where it is accessed critically test these foundational premises. Why should either privacy rights or government access to sought-after evidence depend on where a document is stored at any given moment? Conversely, why should State A be permitted to unilaterally access data located in State B, simply because technology allows it to do so, without regard to State B’s rules governing law enforcement access to data held within its borders? This Article addresses these challenges. It explores the unique features of data and highlights the ways in which data undermines longstanding assumptions about the link between data location and the rights and obligations that should apply. Specifically, it argues that a territorial-based Fourth Amendment fails to adequately protect “the people” it is intended to cover. Conversely, the Article warns against the kind of unilateral, extraterritorial law enforcement that electronic data encourages — in which nations compel the production of data located anywhere around the globe, without regard to the sovereign interests of other nations

    Notice and Standing in the Fourth Amendment: Searches of Personal Data

    Get PDF
    In at least two recent cases, courts have rejected service providers’ capacity to raise Fourth Amendment claims on behalf of their customers. These holdings rely on longstanding Supreme Court doctrine establishing a general rule against third parties asserting the Fourth Amendment rights of others. However, there is a key difference between these two recent cases and those cases on which the doctrine rests. The relevant Supreme Court doctrine stems from situations in which someone could take action to raise the Fourth Amendment claim, even if the particular third-party litigant could not. In the situations presented by the recent cases, by contrast, the service provider was the only source of possible challenge—at least for some meaningful period of time. In both cases, the searches were done pursuant to a warrant issued in accordance with the Stored Communications Act (SCA). Because the government proceeded by warrant, the government was not required to give notice to the target of the search. The warrants were also accompanied by no-notice orders, meaning that the provider was barred from telling anyone, including the target of the search, that his or her data was being sought by the government—in some cases indefinitely. The use of such no-notice warrants served on third-party providers is an increasingly common investigatory tool, wrought by the changes in the way personal information is stored and managed in the digital age. Its use presents a significant shift in how investigations are carried out. It relies on a third-party intermediary between the police and the citizenry to gather information about persons of interest. It makes the searches that are occurring much more indirect and less visible. And it means that individuals are a lot less likely to know—and thus have an opportunity to object—if and when their personal information is being sought and collected by law enforcement officials. This Article examines what has changed; why it matters; and the implications for the Fourth Amendment. Ultimately, this Article makes the case for notice and revisions to standing doctrine as an essential to protecting Fourth Amendment interests and as good policy
    • …
    corecore