Search for: "Cunningham v. California" Results 161 - 173 of 173
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Jun 2011, 12:46 pm by Bexis
  A raft of California intermediate appellate decisions applies the learned intermediary rule to medical devices. [read post]
18 Jun 2012, 3:10 am by New Books Script
25 new acquisitions for the Osgoode Hall Law School Library, including 23 from 2012: HV 8599 G8 K45 2012 This side of silence : human rights, torture, and the recognition of cruelty Tobias Kelly. [read post]
8 Aug 2022, 3:00 am by Jeff Welty
California, 403 U.S. 15 (1971), a man was charged with disturbing the peace after wearing a “fuck the draft” jacket in a courthouse hallway. [read post]
15 May 2019, 7:21 pm
I am delighted to announce the publication of  "Next Generation Law: Data-Driven Governance and Accountability Based Regulatory Systems in the West, and Social Credit Regimes in China," Law &: Southern California Interdisciplinary Law Journal 28(1): 123-172 (2018).In the contemporary world, compliance systems and policing are quickly replacing law and the traditional methods of enforcement (either organic or positive law) as the framework through which collectives (the… [read post]
17 Aug 2011, 2:32 pm by Victor
Daniel Shaviro, Man Who Lost too Much: Zarin v. [read post]
5 Jun 2022, 5:48 pm by Yvonne Nath
., Post 206 (David Cunningham noting that ALSP/NewLaw business model “can, in theory, [be] adopt[ed]” by “any legal service provider”); Post 253 (Anusia Gillespie defining and summarizing the NewLaw approach). [read post]
12 May 2022, 4:24 am by Emma Snell
Erin Cunningham reports for the Wall Street Journal. [read post]
5 Oct 2022, 4:19 am by Emma Snell
Eric Cunningham, Rachel Pannett, Jennifer Hassan and Robyn Dixon report for the Washington Post. [read post]
4 Nov 2013, 9:46 am by Jane Chong
Over the last month, on our New Republic: Security States newsfeed, we rolled out a series designed to explain why fairly allocating the costs of software deficiencies between software makers and users is so critical to addressing the growing problem of vulnerability-ridden code—and how such a regime will require questioning some of our deep-seated beliefs about the very nature of software security. [read post]