{"id":161,"date":"2015-02-17T16:12:01","date_gmt":"2015-02-17T21:12:01","guid":{"rendered":"https:\/\/www.bu.edu\/jostl\/?page_id=161"},"modified":"2017-09-22T10:18:43","modified_gmt":"2017-09-22T14:18:43","slug":"summer-2009","status":"publish","type":"page","link":"https:\/\/www.bu.edu\/jostl\/archives\/summer-2009\/","title":{"rendered":"Vol. 15.2 &#8211; Summer 2009"},"content":{"rendered":"<h2>Articles<\/h2>\n<p><a href=\"\/jostl\/files\/2015\/02\/Melendez-Juarbe_WEB_152.pdf\">DRM Interoperability<\/a><br \/>\nby Hiram Mel\u00e9ndez-Jurabe<\/p>\n<p><a href=\"\/jostl\/files\/2015\/02\/VanTassel_WEB_152.pdf\">Genetically Modified Plants Used for Food, Risk Assessment and Uncertainty Principles: Does the Transition From Ignorance to Indeterminacy Trigger the Need for Post-Market Surveillance?<\/a><br \/>\nby Katharine A. Van Tassel<\/p>\n<h2>Notes<\/h2>\n<p><a href=\"\/jostl\/files\/2015\/02\/Morgulis_WEB_152.pdf\">Juror Reactions to Scientific Testimony: Unique Challenges in Complex Mass Torts<\/a><br \/>\nby Eugene Morgulis<\/p>\n<p><a href=\"\/jostl\/files\/2015\/02\/Schneider_WEB_152.pdf\">Preventing Data Breaches: Alternative Approaches to Deter Negligent Handling of Consumer Data<\/a><br \/>\nby Jacob W. Schneider<\/p>\n<h2>Legal Updates<\/h2>\n<p><a href=\"\/jostl\/files\/2015\/02\/Eisenberg_WEB_152.pdf\">Dumontier v. Schlumberger: Subcellular Damage Under the Price-Anderson Act<\/a><br \/>\nby Carly B. Eisenberg<\/p>\n<p><a href=\"\/jostl\/files\/2015\/02\/Hashemi_WEB_152.pdf\">Stripped Down and Revved Up: The Ninth Circuit&#8217;s Clarification of the Nominative Fair Use and First Amendment Defenses to Trademark Infringement<\/a><br \/>\nby Yasamine Hashemi<\/p>\n<p><a href=\"\/jostl\/files\/2015\/02\/Narodick_WEB_152.pdf\">Winter v. National Resources Defense Council: Going into the Belly of the Whale of Preliminary Injunctions and Environmental Law<\/a><br \/>\nby Benjamin I. Narodick<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Articles DRM Interoperability by Hiram Mel\u00e9ndez-Jurabe Genetically Modified Plants Used for Food, Risk Assessment and Uncertainty Principles: Does the Transition From Ignorance to Indeterminacy Trigger the Need for Post-Market Surveillance? by Katharine A. Van Tassel Notes Juror Reactions to Scientific Testimony: Unique Challenges in Complex Mass Torts by Eugene Morgulis Preventing Data Breaches: Alternative Approaches [&hellip;]<\/p>\n","protected":false},"author":6977,"featured_media":0,"parent":20,"menu_order":26,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/pages\/161"}],"collection":[{"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/users\/6977"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/comments?post=161"}],"version-history":[{"count":5,"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/pages\/161\/revisions"}],"predecessor-version":[{"id":500,"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/pages\/161\/revisions\/500"}],"up":[{"embeddable":true,"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/pages\/20"}],"wp:attachment":[{"href":"https:\/\/www.bu.edu\/jostl\/wp-json\/wp\/v2\/media?parent=161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}