Journal of Law and Commerce https://jlc.law.pitt.edu/ojs/jlc <p><a href="http://www.law.pitt.edu" target="_blank" rel="noopener">University of Pittsburgh School of Law</a></p> <p>In 1981, the law school initiated a second review, the semi-annual <a href="http://jlc.law.pitt.edu/">Journal of Law and Commerce</a>. The decision to publish a journal in this area of the law reflects the law school's strength in the commercial, business, tax, and corporate law areas. Within two years of its inception, the Journal was accepted for inclusion in the prestigious Index to Legal Periodicals.</p> en-US <p><br><strong>Authors who publish with this journal agree to the following terms: </strong><br><br></p> <ol> <ol> <li class="show">The Author retains copyright in the Work, where the term “Work” shall include all digital objects that may result in subsequent electronic publication or distribution.<br><br></li> <li class="show">Upon acceptance of the Work, the author shall grant to the Publisher the right of first publication of the Work.<br><br></li> <li class="show">The Author shall grant to the Publisher and its agents the nonexclusive perpetual right and license to publish, archive, and make accessible the Work in whole or in part in all forms of media now or hereafter known under a <a href="https://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">Creative Commons 4.0 License (Attribution-Noncommercial-No Derivative Works)</a>, or its equivalent, which, for the avoidance of doubt, allows others to copy, distribute, and transmit the Work under the following conditions: <ol style="list-style-type: lower-alpha;"> <li class="show">Attribution—other users must attribute the Work in the manner specified by the author as indicated on the journal Web site;</li> <li class="show">Noncommercial—other users (including Publisher) may not use this Work for commercial purposes;</li> <li class="show">No Derivative Works—other users (including Publisher) may not alter, transform, or build upon this Work,with the understanding that any of the above conditions can be waived with permission from the Author and that where the Work or any of its elements is in the public domain under applicable law, that status is in no way affected by the license. <br><br></li> </ol> </li> <li class="show">The Author is able to enter into separate, additional contractual arrangements for the nonexclusive distribution of the journal's published version of the Work (e.g., post it to an institutional repository or publish it in a book), as long as there is provided in the document an acknowledgement of its initial publication in this journal.<br><br></li> <li class="show">Authors are permitted and encouraged to post online a pre-publication <em>manuscript</em> (but not the Publisher’s final formatted PDF version of the Work) in institutional repositories or on their Websites prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work. Any such posting made before acceptance and publication of the Work shall be updated upon publication to include a reference to the Publisher-assigned DOI (Digital Object Identifier) and a link to the online abstract for the final published Work in the Journal.<br><br></li> <li class="show">Upon Publisher’s request, the Author agrees to furnish promptly to Publisher, at the Author’s own expense, written evidence of the permissions, licenses, and consents for use of third-party material included within the Work, except as determined by Publisher to be covered by the principles of Fair Use.<br><br></li> <li class="show">The Author represents and warrants that:<br><br></li> <ol style="list-style-type: lower-alpha; padding-left: 40px;"> <li class="show">the Work is the Author’s original work;</li> <li class="show">the Author has not transferred, and will not transfer, exclusive rights in the Work to any third party;</li> <li class="show">the Work is not pending review or under consideration by another publisher;</li> <li class="show">the Work has not previously been published;</li> <li class="show">the Work contains no misrepresentation or infringement of the Work or property of other authors or third parties; and</li> <li class="show">the Work contains no libel, invasion of privacy, or other unlawful matter.<br>&nbsp;</li> </ol> <li class="show">The Author agrees to indemnify and hold Publisher harmless from Author’s breach of the representations and warranties contained in Paragraph 6 above, as well as any claim or proceeding relating to Publisher’s use and publication of any content contained in the Work, including third-party content.</li> </ol> </ol> jlc.law@mail.pitt.edu (Editor) e-journals@mail.pitt.edu (Open Jounal Systems Technical Support) Tue, 07 May 2024 12:38:36 -0400 OJS 3.3.0.13 http://blogs.law.harvard.edu/tech/rss 60 Volume 42 Issue 1 Front Matter https://jlc.law.pitt.edu/ojs/jlc/article/view/273 <p>N/A</p> Patrick Sullivan Copyright (c) 2024 Patrick Sullivan https://creativecommons.org/licenses/by-nc-nd/4.0 https://jlc.law.pitt.edu/ojs/jlc/article/view/273 Tue, 07 May 2024 00:00:00 -0400 Recailibrating the Use of Zero-Day Vulnerabilities https://jlc.law.pitt.edu/ojs/jlc/article/view/270 <p>Zero-day vulnerabilities in critical software systems are of the highest priority for government agencies, black market hackers, and private software vendors. Each of these parties has different priorities and uses for zero-day vulnerabilities, but because of the global economy’s reliance on technology and software, they represent a significant threat to much of the critical infrastructure of the United States. The United States Intelligence Community is among one of the most sophisticated players in the zero-day market, and their decision making with respect to these unknown vulnerabilities has widespread impacts. This note examines the current state of the Vulnerabilities Equities Process, the executive branch policy designed to weigh various equities when determining the fate of a zero-day vulnerability discovered by the Intelligence Community; to use the zero-day to collect intelligence or to disclose the vulnerability and see that it is patched. I argue that the current Vulnerabilities Equities Process does not produce the most optimal outcomes, and that the decision making process must be ‘recalibrated’ to properly weigh all relevant equities and to ensure that zero-day vulnerabilities are not being used irresponsibly.</p> Kellen Carleton Copyright (c) 2024 Kellen Carleton https://creativecommons.org/licenses/by-nc-nd/4.0 https://jlc.law.pitt.edu/ojs/jlc/article/view/270 Tue, 07 May 2024 00:00:00 -0400 The Lochneress Monster https://jlc.law.pitt.edu/ojs/jlc/article/view/271 <div data-ogsc="black">This Note will canvas the history and legacy of <em>Lochner v. New York</em>, and examine the effect that Lochnerism has had on American judges. It will discuss the Lochneress Monster, a new name for a familiar idea, and it will focus on how Lochnerism is utilized as an argumentative tool. Finally, the Note will discuss the importance of continuing to give Lochnerism the measured apprehension that it deserves.</div> John Ejzak Copyright (c) 2024 John Ejzak https://creativecommons.org/licenses/by-nc-nd/4.0 https://jlc.law.pitt.edu/ojs/jlc/article/view/271 Tue, 07 May 2024 00:00:00 -0400 Smells Like Teen Exploitation https://jlc.law.pitt.edu/ojs/jlc/article/view/272 <p>The naked baby on the band Nirvana’s popular album, Nevermind, who is now in his thirties, sued Nirvana and other associated individuals in 2022 on the grounds that the cover of the album depicted child pornography. This note examines the validity of the lawsuit, as well as how “going viral” around the world can affect children, even before the Internet and social media. However, this note specifically assesses how social media can be detrimental on children and their development, especially when those children are social media influencers. Additionally, this note will discuss the current online privacy laws and how they can be improved to better protect one of our society’s most vulnerable population demographics.</p> Erica Wilson Copyright (c) 2024 Erica Wilson https://creativecommons.org/licenses/by-nc-nd/4.0 https://jlc.law.pitt.edu/ojs/jlc/article/view/272 Tue, 07 May 2024 00:00:00 -0400 Foreign Investments and Energy Transition in the Netherlands https://jlc.law.pitt.edu/ojs/jlc/article/view/268 <div class="page" title="Page 2"> <div class="layoutArea"> <div class="column"> <p>Affordability, competitiveness, security of supply, and sustainability are among the goals set for the field of the energy transition for 2030 through 2050. In order to meet these goals, the energy sector of the European Union (EU) will require a continuous inflow of capital, particularly Foreign Direct Investment (FDI). Unfortunately, FDI has raised severe national security concerns in EU Member States, leading to the need to adopt and subsequently revisit the FDI screening framework on the EU level. On a domestic level, several EU Member States, such as the Netherlands, have either strengthened <span style="font-size: 0.875rem; font-family: 'Noto Sans', 'Noto Kufi Arabic', -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;">or are considering strengthening their screening mechanisms. States have been screening FDI on national security grounds for decades, but the scope of new mechanisms has dramatically expanded to cover more sectors, transactions, and types of investors. In particular, FDIs that affect energy infrastructure, supply of energy, raw materials, dual-use items, and critical technologies necessary for the energy transition should be subjected to more rigid scrutiny. These regulatory and policy developments might hinder the flow of investments into the energy sector and the advancement of new technologies and thus have implications for the prospects and speed of the energy transition in Europe.</span></p> <div class="page" title="Page 3"> <div class="layoutArea"> <div class="column"> <p>This Article will discuss the overarching question of how states can organize their investment screening mechanisms in a way that balances their national security interests against the need for free flow of FDI to stimulate development of technologies that accelerate the energy transition. This includes a case study of the FDI policy of the Netherlands, one of the major destinations of global FDI. This Article initially distills the principles necessary to balancing competing security and economic interests of host states in the investment law context. Based on such principles, it further examines the extent to which existing regulatory mechanisms in the Netherlands are adequate in addressing security concerns posed by FDI while continuing to attract investments in the energy sector and related technologies. Specifically, this Article aims to identify trends in investment screening in the Netherlands, reflect on their coherence with overarching EU investment policy objectives and the multilateral guidance on a good policy design, and discuss the potential implications of recent regulatory developments for the future of the energy transition in Europe. More broadly, this Article contextualizes the case of the Netherlands within the global movement of tightening control over FDI and explores the relationship between the investment policy of a State, on the one hand, and its objectives to combat climate change and safeguard energy security, on the other.</p> </div> </div> </div> </div> </div> </div> Olga, Saskia Lavrijssen Copyright (c) 2024 Olga, Saskia Lavrijssen https://creativecommons.org/licenses/by-nc-nd/4.0 https://jlc.law.pitt.edu/ojs/jlc/article/view/268 Tue, 07 May 2024 00:00:00 -0400 The Decentralised Autonomous Organization https://jlc.law.pitt.edu/ojs/jlc/article/view/269 <p>Placeholder</p> Guy C. Charleton, Michael Adams, Cindy S. Whang Copyright (c) 2024 Guy C. Charleton, Michael Adams, Cindy S. Whang https://creativecommons.org/licenses/by-nc-nd/4.0 https://jlc.law.pitt.edu/ojs/jlc/article/view/269 Tue, 07 May 2024 00:00:00 -0400