Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Brooklyn Law School

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 94

Full-Text Articles in Entire DC Network

Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli Aug 2023

Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli

Brooklyn Journal of International Law

States have resorted to meddling in the elections of their counterparts throughout history. Recently, though, there has been an exponential increased in the use of the possibilities provided by technology. Attention to this phenomenon has deservedly grown quickly and exponentially. This has led to debates focusing on the adequacy of international legal rules and general principles to respond to foreign cyber election interference. In many of these debates some have expressed doubts and skepticism about the adequacy of current international law to confront foreign election interference through cyber means. There have also been disagreements about the applicable standards to fight …


Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan Aug 2023

Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan

Brooklyn Journal of International Law

Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …


Beyond Consumer Protection: Standardized Stablecoins Disclosure As Information Infrastructure, Shuping Li Aug 2023

Beyond Consumer Protection: Standardized Stablecoins Disclosure As Information Infrastructure, Shuping Li

Brooklyn Journal of International Law

This article argues for standardized disclosure for stablecoins regulation. Information disclosure has long been considered a primary tool for consumer protection. Stablecoin issuers should disclose honestly and responsibly about the qualification of themselves, as well as the value, quantity, and operational mechanism of their stablecoins. Such disclosure can prevent issuers from taking advantage of information asymmetries for consumer exploitation or fraud. It is then up to the consumers to make informed investment or consumption decisions. More importantly, this paper argues that the fundamental role of information disclosure is to form a knowledge base for financial regulation and policymaking. The importance …


Breaking Down Digital Walls: The Interface Of International Trade Law And Online Content Regulation Through The Lens Of The Chinese Vpn Measure, Neha Mishra Dec 2022

Breaking Down Digital Walls: The Interface Of International Trade Law And Online Content Regulation Through The Lens Of The Chinese Vpn Measure, Neha Mishra

Brooklyn Journal of International Law

The interface of international trade law and online content regulation is problematic and complex. This Article examines the consistency of the regulation pertaining to Virtual Private Network (VPN) services in China with WTO law. It argues that although WTO law may be effective in disciplining protectionist aspects of online content regulations, they can neither scrutinize domestic values underlying such regulations nor guarantee the free flow of online content. Thus, existing rules contained in international trade agreements play a limited role in balancing domestic socio-cultural and political values vis-à-vis online censorship with an open, globally interconnected internet enabling seamless digital flows. …


The Use Of Force To Prevent Recurrence Of Conflict: Where Are The Limits Of Self-Defense?, Laurie R. Blank Dec 2020

The Use Of Force To Prevent Recurrence Of Conflict: Where Are The Limits Of Self-Defense?, Laurie R. Blank

Brooklyn Law Review

The prohibition on the use of force is the central pillar of the international system of peace and security, and yet contemporary conflicts continue to stretch and pressure this foundational rule. This article examines how international law applies to the use of force in the territory of another state for the purpose of preventing a resurgence of violence after a conflict has ended. In the absence of consent or U.N. Security Council authorization, can self-defense be a justification for a state to use force to prevent the resurgence of conflict? In January 2018, the United States announced an intended policy …


Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast Dec 2020

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast

Brooklyn Journal of International Law

Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …


Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick Dec 2020

Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick

Brooklyn Journal of International Law

Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …


Cyber-Insecurity: The Reasonableness Standard In Internet Of Things Device Regulation And Why Technical Standards Are Better Equipped To Combat Cybercrime, Chynna Rose Foucek Dec 2020

Cyber-Insecurity: The Reasonableness Standard In Internet Of Things Device Regulation And Why Technical Standards Are Better Equipped To Combat Cybercrime, Chynna Rose Foucek

Brooklyn Journal of Corporate, Financial & Commercial Law

While the Internet of Things (IoT) has created an interconnected world via phones, laptops, and even household devices, it is not infallible. As cyber-attacks increase in frequency, affecting companies of all sizes and industries, IoT device manufacturers have become particularly vulnerable, due in large part to the fact that many companies fail to implement adequate cybersecurity protocols. Mass data breaches occur often. However, these companies are not held accountable due to the use of the reasonableness standard in existing cybersecurity legislation, which is flexible and malleable. In 2019, the California Legislature enacted a cybersecurity law specific to IoT device manufacturers. …


The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff Dec 2020

The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff

Brooklyn Journal of Corporate, Financial & Commercial Law

Space, the final frontier. Resting at the rim of the Earth, an endless void full of opportunity awaits those who are willing to take a leap of faith. Historically, only national space programs have been capable of orchestrating expeditions to outer space. However, American aerospace companies now rival governmental entities in their abilities to operate beyond the Earth’s atmosphere. State-of-the-art developments in aerospace technology have positioned the American commercial space sector to become more productive than national space programs in the years to come. Unfortunately, the potential of the American commercial space sector is severely hindered under the Treaty on …


“To Infinity And Beyond”: A Limitless Approach To Telemedicine Beyond State Borders, Kate Nelson Jun 2020

“To Infinity And Beyond”: A Limitless Approach To Telemedicine Beyond State Borders, Kate Nelson

Brooklyn Law Review

Although the growth and acceptance of technological advances in the medical field have been rapid, the legal system has neglected to adjust its laws accordingly. Perhaps the most significant innovation is telemedicine, which allows a patient and a doctor, miles away from each other, to form a medical relationship across state lines. Yet, the traditional state-by-state physician licensing scheme, which promotes a medical relationship within just one state, remains the governing law. Consequently, many citizens––especially those residing in rural areas––continue to suffer from lack of health care access due to physician shortages within their state borders. Accordingly, this note critically …


“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy Jun 2020

“Estonia’S Gift To The World”: The Implementation Of A Blockchain Protocol For Corporate Governance In New York, Sydney Lauren Abualy

Brooklyn Journal of Corporate, Financial & Commercial Law

The traditional procedures of corporate governance are not designed to resolve issues related to close outcomes of corporate votes, empty voting practices, the proxy voting protocol, verification of shareholder identities, and access to corporate records. Blockchain technology allows all corporate shareholders to participate in corporate governance more conveniently, with increased transparency, on a secure network. Estonia sought to revolutionize corporate governance by facilitating the development of a blockchain based e-voting protocol for shareholders of companies listed on the Tallinn Stock Exchange to vote in shareholder meetings. After unsuccessful attempts, New York stands well behind other states, such as Delaware, in …


The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness Jun 2020

The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness

Brooklyn Journal of Corporate, Financial & Commercial Law

Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …


A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova Jun 2020

A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova

Brooklyn Journal of International Law

Cyber warfare today finds itself on the front page of the news daily. It is increasingly apparent that the cyber domain demands more guidance, with leaders opting for the deployment of cyber capabilities to bypass kinetic warfare norms. Proposed solutions abound, but none adequately address the specific features of cyber warfare that set it apart from traditional kinetic warfare. This Article argues that a new legal framework is necessary to properly address this problem, and such a doctrine should incorporate principles of chaos theory. Chaos theory is a branch of mathematics dealing with complex systems, with the most well-known example …


The Common Law Of Cyber Trespass, Michael J. O'Connor Apr 2020

The Common Law Of Cyber Trespass, Michael J. O'Connor

Brooklyn Law Review

Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …


In Defense Of Brandenburg: The Aclu And Incitement Doctrine In 1919, 1969, And 2019, Emerson J. Sykes Dec 2019

In Defense Of Brandenburg: The Aclu And Incitement Doctrine In 1919, 1969, And 2019, Emerson J. Sykes

Brooklyn Law Review

In the United States, full-throated advocacy—even advocacy of violence—is protected by the First Amendment of the Constitution. Few other countries define “incitement to violence” as narrowly, and governments tend to exploit any authority to regulate speech. The ACLU has played a central role in developing America’s speech-protective modern incitement doctrine over the last century, sometimes by representing clients with abhorrent views, including in the landmark Brandenburg v. Ohio. The Brandenburg test sets a high bar for incitement that should be maintained, even with respect to online speech. Calls for increased regulation of speech should not be heeded.


Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman Dec 2019

Increasing Lapses In Data Security: The Need For A Common Answer To What Constitutes Standing In A Data Breach Context, Aaron Benjamin Edelman

Journal of Law and Policy

As the number of data breaches continues to rise in the United States, so does the amount of data breach litigation. Many potential plaintiffs who suffered as victims of data breaches, however, find themselves in limbo regarding the issue of standing before a court because of a significant split on standing determinations amongst the federal circuit courts. Thus, while victims of data breaches oftentimes have their personal information fall into the hands of nefarious characters who intend to use the information to a victim’s detriment, that may not be enough to provide victims a right to sue in federal court …


Trade Secret Protection In Japan And The United States: Comparison And Recommendations, Thomas Landman Jul 2019

Trade Secret Protection In Japan And The United States: Comparison And Recommendations, Thomas Landman

Brooklyn Journal of International Law

Trade secret law is a vital, yet often misunderstood, form of intellectual property law. As economic superpowers, both Japan and the United States realize that effective trade secret protection is essential for the prosperity of their domestic economies, and both nations have enacted laws to protect their trade secrets. While both Japan and the United States are signatories to the TRIPS agreement and therefore provide a shared baseline standard of trade secret protection, cultural and systemic differences between the two nations have resulted in differences in the way each nation implements its trade secret laws. This Note traces the history …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams May 2019

On The Clock, Best Bet To Draft Cyberdefensive Linemen: Federal Regulation Of Sports Betting From A Cybersecurity Perspective, William H. Williams

Brooklyn Journal of Corporate, Financial & Commercial Law

On May 14, 2018, Justice Alito delivered the majority opinion for the United States Supreme Court in Murphy v. National Collegiate Athletic Association (NCAA). The Professional and Amateur Protection Act (PASPA), a twenty-six-year-old federal statute, was deemed unconstitutional; thus, this decision allows state legislatures to legalize sports betting within their borders. With many states independently legalizing sports gambling, the regulatory landscape throughout the country is becoming a patchwork of state statutes. Additionally, top tier sporting organizations heavily depend on data analytics to formulate game plan strategy, train efficiently, rehab player injuries, gauge team and player performance, etc. The popularity of …


Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman Jan 2019

Pay For (Privacy) Performance: Holding Social Network Executives Accountable For Breaches In Data Privacy Protection, Lital Helman

Brooklyn Law Review

Social networking has proliferated over the past years and is now being utilized by a large percentage of the world’s population. Social networks substantially contribute to enhanced speech, creativity, and communication. Yet, their practices of collecting and monetizing personal data of users pose severe privacy risks. Compelling social networks to internalize these risks is crucial for the healthy evolution of social networking. This article proposes a novel approach to address this challenge: to link executive compensation in social networking firms to the quality of data protection the company provides to its users. This proposal is different from other solutions that …


The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny Oct 2018

The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny

Brooklyn Journal of Corporate, Financial & Commercial Law

What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …


Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz Oct 2018

Telemarketing, Technology, And The Regulation Of Private Speech: First Amendment Lessons From The Fcc’S Tcpa Rules, Justin (Gus) Hurwitz

Brooklyn Law Review

This article considers the viability of the Telephone Consumer Protection Act (TCPA) in light of recent Supreme Court First Amendment precedent and technological and regulatory developments. Robocalls—phone calls made using autodialers or prerecorded messages without the consent of the call recipient—have become one of the primary consumer protection issues facing regulators. With more than 2.4 billion of these calls placed each month, consumer concern about them dominate complaints received by both the Federal Communications Commission and Federal Trade Commission. Simultaneously, as cellphones have become a ubiquitous means by which individuals engage with one another and have become the public square, …


The Modern-Day Scarlet Letter: Erasing The Scar Of Non-Consensual Pornography Through Affirmative Consent, Jennifer Esposito Oct 2018

The Modern-Day Scarlet Letter: Erasing The Scar Of Non-Consensual Pornography Through Affirmative Consent, Jennifer Esposito

Journal of Law and Policy

Most have heard the phrase “revenge pornography” via the various websites that have infiltrated the internet for the sole purpose of posting this type of content. Not only do these websites display photos and videos of the victim in their most intimate moments, but they also often include names, addresses, phone numbers, and other identifying information. While many people know what revenge pornography is, they are completely unaware of the devastating impact that revenge pornography has on victims, the majority of which are women. As a result of revenge pornography, victims often suffer from mental illnesses (depression, anxiety, suicidal ideation, …


No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia Jul 2018

No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia

Brooklyn Law Review

Cybersecurity is increasingly vital in a climate of unprecedented digital assaults against liberal democracy. Russian hackers have launched destabilizing cyberattacks targeting the United States’ energy grid, voting machines, and political campaigns. America's existing inadequate cyber defenses operate according to a simple assumption: hide the computer code that powers critical infrastructure so that America's enemies cannot exploit undiscovered weaknesses. Indeed, the intellectual property regime relies entirely on this belief, protecting those who own the rights in computer code by punishing those who might access and copy that code. This “security through obscurity” approach has failed. Rightsholders, on their own, cannot develop …


Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman Jun 2018

Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman

Brooklyn Journal of Corporate, Financial & Commercial Law

The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …


The Justinian Feb 2018

The Justinian

The Justinian

No abstract provided.


The Justinian Feb 2018

The Justinian

The Justinian

No abstract provided.


The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz Dec 2017

The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz

Brooklyn Journal of International Law

As part of the U.K.’s electronic surveillance program, the Government Communications Headquarters (GCHQ), started in 1909 to combat German Spies, now collects metadata from both foreigners and its own citizens. Through the express statutory authority of the Regulation of Investigatory Powers Act of 2000 (RIPA), and a loophole in section 94 of the Telecommunications Act of 1984, the GCHQ collects metadata, which is all of the information that is extrinsic to the actual contents of a communication. The GCHQ can request an authorization from a public authority—a member of its own staff—to collect traffic data, service use information, or subscriber …


Secrecy For The Sake Of It: The Defend Trade Secrets Act, Lauren Rayner Davis Dec 2017

Secrecy For The Sake Of It: The Defend Trade Secrets Act, Lauren Rayner Davis

Brooklyn Law Review

With foreign economic espionage and national security concerns thrust to the forefront of the discussion, Congress nearly unanimously passed the Defend Trade Secrets Act after a concerted effort by the executive branch, federal law enforcement, and intellectual property scholars. While this landmark legislation provides the long sought-after grounds of original federal jurisdiction for trade secret misappropriation claims, the statute also offers litigants a powerful remedy—the ex parte seizure provision. This unprecedented provision in trade secrets law allows a plaintiff, with no notice to the defendant, to file an application with the court requesting that U.S. Marshals seize and hold the …


Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy Jan 2017

Reevaluating Attorney-Client Privilege In The Age Of Hackers, Anne E. Conroy

Brooklyn Law Review

The news story is now familiar: hackers breach a security system and post internal, confidential information online for anyone with an Internet connection to comb through. This digital version of whistleblowing, called “hacktivism,” is attractive to the media, which has leaned on broad First Amendment protections to widely cover the confidential communications revealed by hackers. These hacks also provide attorneys with enticing opportunities to look through previously confidential files. But as ethics and evidentiary rules stand, it is not clear if an attorney may view the files, let alone use them as evidence in litigation. That companies are hacked is …