Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Law

Defining And Demystifying Automated Decision Systems, Rashida Richardson Jan 2022

Defining And Demystifying Automated Decision Systems, Rashida Richardson

Maryland Law Review

No abstract provided.


Five Approaches To Insuring Cyber Risks, Christopher C. French Jan 2021

Five Approaches To Insuring Cyber Risks, Christopher C. French

Maryland Law Review

No abstract provided.


Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger Apr 2019

Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger

Maryland Law Review

Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch.


Online Terms As In Terrorem Devices, Colin P. Marks Apr 2019

Online Terms As In Terrorem Devices, Colin P. Marks

Maryland Law Review

Online shopping has quickly replaced the brick-and-mortar experience for a large portion of the consuming public. The online transaction itself is rote: browse items, add them to your cart, and check out. Somewhere along the way, the consumer is likely made aware of (or at least exposed to) the merchant’s terms and conditions, via either a link or a pop-up box. Such terms and conditions have become so ubiquitous that most consumers would be hard-pressed to find a merchant that doesn’t try to impose them somewhere on their website. Though such terms and conditions are pervasive, most consumers do not …


The Error Theory Of Contract, Matthew A. Seligman Dec 2018

The Error Theory Of Contract, Matthew A. Seligman

Maryland Law Review

Many people have false beliefs about contract doctrine. That pervasive phenomenon has profound practical, theoretical, and normative implications that neither courts nor scholars have recognized. This Article will make three contributions to fill that gap. First, it will establish just how widespread the phenomenon is among non-lawyers. After synthesizing the existing evidence of false beliefs about contract law, it will contribute a new empirical study showing that between one-third and one-half of people falsely believe specific performance rather than damages is the remedy for breach.

The Article will then argue that people’s false beliefs about contract doctrine pose a fundamental …


Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan Jul 2017

Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan

Maryland Law Review

No abstract provided.


Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm Jul 2017

Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm

Maryland Law Review

No abstract provided.


The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog Jun 2017

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog

Maryland Law Review

No abstract provided.


Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr. Jan 2014

Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr.

Journal of Business & Technology Law

No abstract provided.


Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte Jan 2014

Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte

Journal of Business & Technology Law

No abstract provided.


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley Jan 2014

Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley

Journal of Business & Technology Law

No abstract provided.


The Looming Threat Of Cyberterrorism Jan 2013

The Looming Threat Of Cyberterrorism

Maryland Carey Law

Technology has the ability to make gray what was once the black letter of the law.


Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah Jan 2013

Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah

Journal of Business & Technology Law

No abstract provided.


The Anonymous Internet, Bryan H. Choi Jan 2013

The Anonymous Internet, Bryan H. Choi

Maryland Law Review

No abstract provided.


A Commission On A Cyber Mission, Adrian Wilairat Jan 2013

A Commission On A Cyber Mission, Adrian Wilairat

Journal of Business & Technology Law

No abstract provided.


Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean Jan 2013

Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean

Journal of Business & Technology Law

No abstract provided.


Compliance In The Ether: Cloud Computing, Data Security And Business Regulation, J. Nicholas Hoover Jan 2013

Compliance In The Ether: Cloud Computing, Data Security And Business Regulation, J. Nicholas Hoover

Journal of Business & Technology Law

No abstract provided.


Tort Liability For Vendors Of Insecure Software: Has The Time Finally Come?, Michael D. Scott Jan 2008

Tort Liability For Vendors Of Insecure Software: Has The Time Finally Come?, Michael D. Scott

Maryland Law Review

No abstract provided.