Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Surveillance (5)
- Virtual worlds (5)
- Big data (3)
- Biometrics (3)
- Bitcoin (3)
-
- Blockchain (3)
- NFT (3)
- Patent (3)
- Cyberlaw (2)
- Digital (2)
- Information technology (2)
- Property (2)
- Technology (2)
- Technology law (2)
- 5G (1)
- Agriculture (1)
- Antitrust (1)
- Bankruptcy (1)
- Big Data (1)
- Blockchain law and technology (1)
- Bose (1)
- Censorship (1)
- Cities (1)
- Code (1)
- Coding (1)
- Computer Fraud and Abuse Act (1)
- Computers & privacy (1)
- Consumer's rights (1)
- Contract (1)
- Contracts (1)
Articles 1 - 30 of 53
Full-Text Articles in Entire DC Network
Crypto-Counterfeiting, Joshua Fairfield
Crypto-Counterfeiting, Joshua Fairfield
Scholarly Articles
The current crypto winter has given rise to a range of legal challenges. One of the most important sets of legal challenges goes to the heart of cryptocurrency. Cryptocurrency was intended to be non-duplicatable at will, that is, not to be counterfeitable. Blockchain technology is supposed to prevent token counterfeiting through a combination of game theory and cryptography that prevents normal users from simply ordering the system to generate more tokens for their benefit.
The difficulty is that blockchain software is still software. People in charge can order and program the software to generate many more tokens for those individuals’ …
Making Virtual Things, Joshua A.T. Fairfield
Making Virtual Things, Joshua A.T. Fairfield
Scholarly Articles
People value virtual things—such as NFTs—because such assets trigger and satisfy deep-seated narratives of property and ownership. The cause of the recent series of failures to regulate virtual assets, and the resulting crashes, has been a failure to take seriously the ways people perceive and use the assets. Current legal frameworks fail to support buyers’ and users’ expectations of ownership in virtual things they purchase.
Making virtual things is a matter of social construction of value. Virtual things, like real-world things, have value because a community values them for a purpose. It therefore makes no sense to discount how and …
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Scholarly Articles
Much of the confusion about the proper regulation of smart contracts stems from the fact that both code and law are expressed in language. Natural (human) and formal (computer) languages are profoundly different, however. Natural language in the form of a true legal contract expresses human meaning and expectation. Code simply acts, and when code acts contrary to the understanding of the parties to a contract, courts must have a theoretical and legal basis in order to intervene--which this Article provides.
Present scholarship on the governance of smart contracts centers on logistical problems relating to the effects of automation on …
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Scholarly Articles
Markets for unique digital property--digital equivalents of rare artworks, collectible trading cards, and other assets that gain value from scarcity--have exploded in the past few years. At root is the next iteration of blockchain technology, unique digital assets called non-fungible tokens. Unlike bitcoin, where one coin is the same as another, NFTs are unique, each with different attributes. An NFT that represented ownership of Boardwalk would be quite different from one that represented Baltic Avenue.
NFTs have grown from a few early breakout successes to a rapidly developing market for unique digital treasures. The attraction to buyers is that, unlike …
Property As The Law Of Virtual Things, Joshua A.T. Fairfield
Property As The Law Of Virtual Things, Joshua A.T. Fairfield
Scholarly Articles
Property law in the twentieth century moved from the law of things to the law of rights in things. This was a process of fragmentation: Under Hohfeldian property, we conceive of property as a bundle of sticks, and those sticks can be moved to different holders; the right to possess can be separated from the record ownership right, for example. The downside of Hohfeld's model is that physical objects—things—become informationally complicated. Thing-ness constrains the extravagances of Hohfeldian property: although we can split off the right to possess from the right to exclude, use, destroy, copy, manage, repair, and so on, …
Limiting The Boundaries Of Assisted Reproductive Technology And Physiological Autonomy, George P. Smith Ii
Limiting The Boundaries Of Assisted Reproductive Technology And Physiological Autonomy, George P. Smith Ii
Scholarly Articles
This essay examines, critically, the wide successes of assisted reproductive technology (ART). With these successes have come concerns regarding its potential advancement of the boundaries of fecundity and of new levels of physiological freedom. One particular advancement involves efforts to utilize a phenomenon of nature termed parthenogenesis, or asexual reproduction. The potential for adapting this occurrence as a form of assisted reproduction is of particular interest for members of the LGBTQ community, holding great promise for embryo research and regenerative medicine. Parthenogenetic embryos could be derived from unfertilized human eggs and, thus, blunt--if not resolve--ethical concerns over experimentation on human …
#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl
#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl
Scholarly Articles
With limited resources and a diminished budget, it is not surprising that the Internal Revenue Service would seek new tools to maximize its enforcement efficiency. Automation and technology provide new opportunities for the IRS, and in turn, present new concerns for taxpayers. In December 2018, the IRS signaled its interest in a tool to access publicly available social media profiles of individuals in order to “expedite IRS case resolution for existing compliance cases.” This has important implications for taxpayer privacy.
Moreover, the use of social media in tax enforcement may pose a particular harm to an especially vulnerable population: low-income …
Federalism In The Algorithmic Age, Chad Squitieri
Federalism In The Algorithmic Age, Chad Squitieri
Scholarly Articles
The robots will not be pleased with Frank Pasquale. In New Laws of Robotics, the Brooklyn Law professor outlines two possible futures that can emerge from a growing conflict between human and robotic thought. The first is a future of robotic dominance. In that future, decisions traditionally made by human professionals (e.g., who goes to jail, what medicines are prescribed, and what news gets published) are decided by robots powered by artificially intelligent algorithms. The second future offers robots a less-favored role in the ordering of human affairs. Pasquale earns the displeasure of our would-be robotic overlords by outlining the …
The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield
The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield
Scholarly Articles
This Article constitutes a lightly edited transcription of Joshua Fairfield's oral remarks at the April 6, 2018 Cleveland State Law Review Symposium on Blockchain Law and Technology.
The author posits that there is a tendency to think that technology will emerge triumphant in resolving physical problems, including banking and transactional recording; that there is sort of a "tech-bro utopianism," epitomized by Mark Zuckerberg, suggesting that what we need is a technological, not a human, solution. He states that one major problem is that social technologists, psychologists, historians, linguists, and cultural anthropologists are not on the development teams that are building …
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor
Scholarly Articles
Smart-city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage, and keep us healthy and safe. Its adoption is necessary because of changes that are predicted for urban dwellers over the next three decades; urban population and travel are predicted to increase dramatically and our population is graying, meaning the population will include a much greater number of elderly citizens. As these changes occur, smart-city technology can have a huge impact on public safety, improving the ability of law enforcement to investigate crimes, both with …
The Immediacy Of Genome Editing And Mitochondrial Replacement, Raymond C. O'Brien
The Immediacy Of Genome Editing And Mitochondrial Replacement, Raymond C. O'Brien
Scholarly Articles
After human DNA was first defined in 1953, the parallel science of assisted reproductive technology achieved a successful human birth through in vitro fertilization in 1978. Science then went on to facilitate gestational surrogacy, banking human reproductive materials, such as embryos, and greater opportunities for couples and individuals to become parents. Fertility clinics were established throughout the world to help persons and couples achieve parenthood, contributing to a steady increase in babies born through assisted reproductive means. Gradually, both federal and state laws in the United States were enacted to collect data from the fertility clinics, mandate insurance coverage of …
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu
Scholarly Articles
To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …
The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary
The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary
Scholarly Articles
Section 230 of the Communications Decency Act is a 1996 law wholly inadequate to address 21st Century problems. The most egregious example of this is online sex trafficking, which was allowed not only to exist, but also to thrive due, in large part, to §230. This Article examines the development of the jurisprudence regarding online advertising of sex-trafficking victims and juxtaposes the forces that created § 230 with those preventing its timely amendment. This Article argues that, although § 230 was never intended to create a regime of absolute immunity for defendant websites, a perverse interpretation of the non-sex …
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary
Scholarly Articles
Forensic science transforms criminal investigations by resolving previously unsolvable cases and bringing an increased sense of justice to communities. This application of scientific disciplines to legal questions aids investigators in solving crimes. While many sciences can be utilized—such as physics (pattern evidence), chemistry (toxicology), or biology (cause of death), to name a few—two aspects of scientific advancement have played an outsized role in responding to crime. Trace evidence analysis—specifically, deoxyribonucleic acid (DNA) analysis—is an essential component to an effective and accurate criminal justice system. DNA evidence has emerged as a powerful tool to identify perpetrators of unspeakable crimes and to …
Crimmigration-Counterterrorism, Margaret Hu
Crimmigration-Counterterrorism, Margaret Hu
Scholarly Articles
The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
Scholarly Articles
This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Scholarly Articles
This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …
Data Privacy And Inmate Recidivism, Chad Squitieri
Data Privacy And Inmate Recidivism, Chad Squitieri
Scholarly Articles
Private companies are awarded contracts to provide Internet technologies within jails and prisons. These correctional contractors often argue that their services can reduce recidivism rates by, for example, providing inmates with access to video messaging services where inmates can communicate with loved ones who are otherwise unable to travel to communicate in person. A close examination of the privacy policies offered by correctional contractors, however, reveals how efforts to reduce recidivism rates are undermined.
As this Essay will explain, correctional contractors collect sensitive data about inmates and the loved ones with whom they communicate. If this data is stolen or …
Confronting Big Data: Applying The Confrontation Clause To Government Big Data Collection, Chad Squitieri
Confronting Big Data: Applying The Confrontation Clause To Government Big Data Collection, Chad Squitieri
Scholarly Articles
When government investigators request data from companies such as Google, they obtain data on targeted individuals with a guarantee that the data has been collected, stored, and analyzed properly. These guarantees constitute a testimonial statement under the Confrontation Clause. Similar to lab analysts who submit test results of cocaine samples or blood alcohol levels, this Note argues that analysts involved with the collection, storage, and analysis of big data must be available for confrontation under the Sixth Amendment.
Who's The Vandal? The Recent Controversy Over The Destruction Of 5pointz And How Much Protection Does Moral Rights Law Give To Authorized Aerosol Art?, Susanna Frederick Fischer
Who's The Vandal? The Recent Controversy Over The Destruction Of 5pointz And How Much Protection Does Moral Rights Law Give To Authorized Aerosol Art?, Susanna Frederick Fischer
Scholarly Articles
This paper considers the extent to which federal moral rights law protects authorized graffiti and aerosol art against destruction, in the context of the controversy over the destruction of 5Pointz. 5Pointz, a sprawling complex of warehouse buildings in Queens, was a Mecca for aerosol art. The buildings’ owners ordered the demolition of 5Pointz after the November 2013 order by New York federal district judge Frederic Block denying the artists a preliminary injunction to stop destruction under the federal moral rights statute, the Visual Artists Rights Act (VARA). This paper argues that Judge Block erred in finding that the transient nature …
Digital Innocence, Joshua A.T. Fairfield, Erik Luna
Digital Innocence, Joshua A.T. Fairfield, Erik Luna
Scholarly Articles
Recent revelations have shown that almost all online activity and increasing amounts of offline activity are tracked using Big Data and data mining technologies. The ensuing debate has largely failed to consider an important consequence of mass surveillance: the obligation to provide access to information that might exonerate a criminal defendant. Although information technology can establish innocence—an ability that will only improve with technological advance—the fruits of mass surveillance have been used almost exclusively to convict. To address the imbalance and inform public dialogue, this Article develops the concept of “digital innocence” as a means of leveraging the tools of …
Sowing The Seeds Of Protection, Elizabeth I. Winston
Sowing The Seeds Of Protection, Elizabeth I. Winston
Scholarly Articles
Seeds are chattel. As such, seeds are protectable by the same tapestry of public and private ordering as other forms of chattel. However, the distinguishing characteristic of seeds, their method of propagation, and the history of seeds-traditionally viewed as a public good rather than chatteldistort that tapestry. The model of seed distribution thus needs to be refrained in light of the often disparate interests of innovators, producers, and consumers. As with all chattel, there is no single, correct model for distributing seeds, but law and contract may be woven together to strike a balance.
Applying Bioethics In The 21st Century: Principlism Or Situationism?, George P. Smith Ii
Applying Bioethics In The 21st Century: Principlism Or Situationism?, George P. Smith Ii
Scholarly Articles
After an examination of the four cardinal bioethical principles which define Principlism — autonomy, beneficence, non maleficence and justice — an explication of Joseph Fletcher’s theory of Situationism is undertaken.
The conclusion of this Article is that when an ethical dilemma arises and is “tested” as to its moral efficacy, rather than judge the acts in question in order to determine whether they are in conformance with one of the four bioethical principles, it is more humane and practical to determine the ethical propriety of questioned conduct by use of a situation ethic which in fact is more sensitive. This …
Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield
Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield
Scholarly Articles
Researchers love virtual worlds. They are drawn to virtual worlds because of the opportunity to study real populations and real behavior in shared simulated environments. The growing number of virtual worlds and population growth within virtual worlds has led to a sizeable increase in the number of human subjects experiments taking place in such worlds.
Virtual world users care deeply about their avatars, their virtual property, their privacy, their relationships, their community, and their accounts. People within virtual worlds act much as they would in the physical world because the experience of the virtual world is “real” to them. The …
"Do-Not-Track" As Contract, Joshua A.T. Fairfield
"Do-Not-Track" As Contract, Joshua A.T. Fairfield
Scholarly Articles
Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically — telephone numbers do not change, whereas Internet protocol (IP) …
The Challenges To Legal Education In 1973 And 2012: An Introduction To The Anniversary Issue Of The Hofstra Law Review, Nora V. Demleitner
The Challenges To Legal Education In 1973 And 2012: An Introduction To The Anniversary Issue Of The Hofstra Law Review, Nora V. Demleitner
Scholarly Articles
Not available.
Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield
Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield
Scholarly Articles
Just as the Internet linked human knowledge through the simple mechanism of the hyperlink, now reality itself is being hyperlinked, indexed, and augmented with virtual experiences. Imagine being able to check the background of your next date through your cell phone, or experience a hidden world of trolls and goblins while you are out strolling in the park. This is the exploding technology of Mixed Reality, which augments real places, people, and things with rich virtual experiences.
As virtual and real worlds converge, the law that governs virtual experiences will increasingly come to govern everyday life. The problem is that …
The Technological Edge, Elizabeth I. Winston
The Technological Edge, Elizabeth I. Winston
Scholarly Articles
To grant a patent to natural phenomena hinders innovation, taking back from the public that which the public has a right to possess. To deny a patent to man’s manufacture undercuts the fundamental bargain of the patent system. All inventions, at their core, may be deemed natural, rendering it difficult to distinguish between man’s manufacture and natural phenomena. Determining whether the innovative aspect of the product is a technological one, rather than a natural one, can clarify whether the patent grant promotes the progress of science and the useful arts. The higher the level of skill in the art required …
Nexus Crystals: Crystallizing Limits On Contractual Control Of Virtual Worlds, Joshua A.T. Fairfield
Nexus Crystals: Crystallizing Limits On Contractual Control Of Virtual Worlds, Joshua A.T. Fairfield
Scholarly Articles
Can a video game developer or publisher successfully sue a video game player for copyright infringement for not “playing a game nicely,” “cheating,” or “buying software from a third party”? This article suggests a new reason why it cannot.
The founding social contract of the new millennium is the End User License Agreement (EULA), not the U.S. Constitution. Website terms of use (TOU) and software EULAs now have an enormous impact on how citizens must act and how their rights and redresses are defined. EULAs contain not only traditional intellectual property licensing conditions but complicated directives regarding what members of …
Clarifying The Doctrine Of Inequitable Conduct, Elizabeth I. Winston
Clarifying The Doctrine Of Inequitable Conduct, Elizabeth I. Winston
Scholarly Articles
Addressing squarely the issue of the multiple standards of materiality in inequitable conduct litigation, Therasense v. Becton Dickinson raises many difficult issues that could be clarified through the lens of the analogous concept of fraud on the Trademark Office. The standards for finding fraud on the Trademark Office lack the ambiguity found in the doctrine of inequitable conduct, despite the parallel penalties of unenforceability and requirements of proof of materiality and intent. Informed by the many decisions of Judge Michel, this essay concludes that the standards for finding fraud before the Trademark Office, as set forth in In re Bose, …