Arizona State Law Journal Blog

Arizona’s Compulsory Arbitration Program: Is It Time for a Reform?

By Christian Fernandez. What is Arizona’s compulsory arbitration program? Arbitration is a form of alternative dispute resolution where an independent third party hears the case and determines the result. Arizona courts have adopted a compulsory arbitration program for all civil lawsuits that meet the requirements listed in Rules 72–77 of the Arizona Rules of Civil Procedure. All civil disputes valued under a specific amount are resolved through this arbitration program instead of litigating in court. This program applies to plaintiffs that are only seeking money damages. In addition, this program does not apply to criminal lawsuits. How does the compulsory

Read More »

Do plaintiffs in data breach cases have a leg to stand on?

By Kacie Donovan. Data breaches and resulting amounts of compromised personal information are increasing rapidly. The FBI has said “[T]here are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.” Unsurprisingly, plaintiffs affected by these ever-common data breaches are seeking relief in court. Standing doctrine is a hotly contested battleground for the parties to litigation following a data breach. In some courts, plaintiffs experience difficulty demonstrating that the theft of their data alone gives them standing. Several

Read More »

CBD: The Legality & Regulation of the “Other” Cannabis Ingredient

By Abby Dockum. Over the past several years, products containing cannabidiol—better known as CBD—have spread across the shelves of grocery stores and pharmacies. Sales of CBD products are expected to surpass $5 billion dollars in 2019, up 700% from 2018. This may be attributed in part to increased research on the health benefits of CBD, but it is more likely due to changes in CBD’s legal status. What is CBD? CBD, like tetrahydrocannabinol (THC), is an active ingredient of cannabis. Unlike THC, however, CBD has no psychoactive effect, meaning it does not cause a “high.” CBD is not addictive, and

Read More »

Defective Work & Offers to Cure: Do Contractors Have a Common Law Right to Cure?

By Caitlin Doak. No published Arizona opinion provides for an implied right to cure. However, a recent unpublished Court of Appeals opinion suggests that Arizona is inching closer to adopting an implied right to cure absent a contractual right to cure. In Fisher v. Rondo Pools, 1 CA-CV 18-0343 (Ariz. App. 2019), the court found no error in the superior court instructing the jury that “in determining whether Rondo materially breached the contract, it could consider Rondo’s ‘ability to cure or fix the alleged breach’ and whether Rondo ‘can make any reasonable assurances that it would cure the alleged breach.’”

Read More »

Supreme Court Kicks Off Controversial Docket

By Harman Dhanoa. On October 7th, 2019, the justices returned to the bench for what has been called “the most significant Supreme Court term in a decade.” The docket of 59 cases is set to cover high-profile matters including abortion, gun rights, LGBT+ rights, presidential power, and more. While Chief Justice John Roberts has long sought to maintain an image of the Court as an apolitical institution, all eyes will be on the conservative-leaning Court as it rules on divisive issues ahead of the 2020 presidential election. A brief overview of the issues on the docket this term: Abortion In

Read More »

The Computer Fraud and Abuse Act: Why a Change in the Legislation is Needed

By Chase Colwell. By 1986, it was clear that computers were becoming an inextricable component of modern society. However, this new and developing technology was ripe for abuse in various ways. At the time, there were not any adequate legal remedies for victims of these abuses, so Congress saw fit to create a criminal statute addressing those concerns. Thus, The Computer Fraud and Abuse Act (CFAA) of 1986 was born. The CFAA’s primary concern was to prevent “hacking.” As such, the CFAA made it a crime under § 1030(a)(2)(C) for an individual to “intentionally access[] a computer without authorization or

Read More »

Subscribe to the Arizona State Law Journal Blog

Receive notifications of new posts directly to your inbox!

Submit your information below.
Subscribe
The opinions expressed herein are those of the individual contributors to the ASLJ Blog and should not be construed as the opinions of the
Arizona State Law Journal or the Sandra Day O’Connor College of Law at Arizona State University.