Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Entire DC Network

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone Apr 2015

Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone

Michele R. Pistone

1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass Apr 2015

Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass

Loyola of Los Angeles Law Review

Autonomous weapons are increasingly used by militaries around the world. Unlike conventional unmanned weapons such as drones, autonomous weapons involve a machine deciding whether to deploy lethal force. Yet, because a machine cannot have the requisite mental state to commit a war crime, the legal scrutiny falls onto the decision to deploy an autonomous weapon. This Article focuses on the dual questions arising from that decision: how to regulate autonomous weapon use and who should be held criminally liable for an autonomous weapon’s actions. Regarding the first issue, this Article concludes that regulations expressly limiting autonomous weapon use to non-human …


The Fda And The Rise Of The Empowered Patient, Lewis Grossman Jan 2015

The Fda And The Rise Of The Empowered Patient, Lewis Grossman

Contributions to Books

No abstract provided.


Secondary Data: A Primary Concern, Kelsey L. Zottnick Jan 2015

Secondary Data: A Primary Concern, Kelsey L. Zottnick

Vanderbilt Journal of Entertainment & Technology Law

This Note addresses privacy concerns implicated by rising secondary data mining. Secondary data mining is the use of personal information for a purpose other than the original. This complex technology drives billions of dollars in commercial industry yet remains largely unregulated. This Note examines the current state of the data mining industry and the behavioral fallacies that belie societal concerns about online privacy. Further, relevant federal, state, and constitutional laws appear outstripped by these technological advances. An analysis of potential privacy solutions examines the advantages and disadvantages of implementing each one through the privacy community, the federal government, and the …


Campbell At 21/Sony At 31, Jessica D. Litman Jan 2015

Campbell At 21/Sony At 31, Jessica D. Litman

Articles

When copyright lawyers gather to discuss fair use, the most common refrain is its alarming expansion. Their distress about fair use’s enlarged footprint seems completely untethered from any appreciation of the remarkable increase in exclusive copyright rights. In the nearly forty years since Congress enacted the 1976 copyright act, the rights of copyright owners have expanded markedly. Copyright owners’ demands for further expansion continue unabated. Meanwhile, they raise strident objections to proposals to add new privileges and exceptions to the statute to shelter non-infringing uses that might be implicated by their expanded rights. Copyright owners have used the resulting uncertainty …


Internet Freedom With Teeth, Charles Duan Jan 2015

Internet Freedom With Teeth, Charles Duan

Articles in Law Reviews & Other Academic Journals

"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."

So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …


The Anti-Innovators: How Special Interests Undermine Entrepreneurship, James Bessen Jan 2015

The Anti-Innovators: How Special Interests Undermine Entrepreneurship, James Bessen

Faculty Scholarship

For much of the last century, the United States led the world in technological innovation-a position it owed in part to well-designed procurement programs at the Defense Department and NASA. During the 1940s, for example, the Pentagon funded the construction of the first general-purpose computer, designed initially to calculate artillery-firing tables for the U.S. Army. Two decades later, it developed the data communications network known as the ARPANET, a precursor to the Internet. Yet not since the 1980s have government contracts helped generate any major new technologies, despite large increases in funding for defense-related R & D. One major culprit …


From Anonymity To Identification, A. Michael Froomkin Jan 2015

From Anonymity To Identification, A. Michael Froomkin

Articles

This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …


Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski Jan 2015

Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski

Publications

A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …


Participatory Fact-Finding: Developing New Directions For Human Rights Investigations Through New Technologies, Molly Land Dec 2014

Participatory Fact-Finding: Developing New Directions For Human Rights Investigations Through New Technologies, Molly Land

Molly K. Land

This chapter considers the way in which broader participation in human rights fact-finding, enabled by the introduction of new technologies, will change the nature of fact-finding itself. Using the example of a participatory mapping project called Map Kibera, the chapter argues that new technologies will change human rights fact-finding by providing opportunities for ordinary individuals to investigate the human rights issues that affect them. Those who were formerly the ‘subjects’ of human rights investigations now have the potential to be agents in their own right. This ‘participatory fact-finding’ may not be as effective in ‘naming and shaming’ states and companies …


Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews Dec 2014

Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews

Lori B. Andrews

A comprehensive report concerning the many ways that webcams can be used against those who possess them. Digital Peepholes also provides in depth legal analysis of the legality of private companies and the government using people’s webcams to spy on them. A must read for anyone concerned with privacy or anyone with a webcam built in to their devices!