Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Law

Where To Prosecute Cybercrimes, Jacob T. Wall May 2019

Where To Prosecute Cybercrimes, Jacob T. Wall

Duke Law & Technology Review

Selecting the appropriate venue for a criminal trial has been a matter of constitutional concern since the founding of the country. The issue is thought to be essential to the fair administration of justice and thus public confidence in the criminal justice system. Constitutionally, crimes must be prosecuted in the states and districts in which they were committed. However, the rise of cybercrime has complicated the venue inquiry: cyberspace, the domain of cybercrime, and physical space have become increasingly decoupled. Consequently, under America’s primary but dated cybercrime law, the ideal location for a trial may not be a constitutionally proper …


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt Apr 2014

Aftermarketfailure: Windows Xp's End Of Support, Andrew Tutt

Michigan Law Review First Impressions

After 12 years, support for Windows XP will end on April 8, 2014. So proclaims a Microsoft website with a helpful clock counting down the days. "What does this mean?" the website asks. "It means you should take action." You should "migrate to a current supported operating system - such as Windows 8.1 - so you can receive regular security updates to protect [your] computer from malicious attacks." The costs of mass migration will be immense. About 30% of all desktop PCs are running Windows XP right now. An estimated 10% of the U.S. government's computers run Windows XP, including …


Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose Feb 2013

Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose

Pepperdine Law Review

The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen Jun 2002

Computer Searches And Seizures: Some Unresolved Issues, Susan W. Brenner, Barbara A. Frederiksen

Michigan Telecommunications & Technology Law Review

The goal of this article is to illustrate the issues that arise in the context of computer search and seizures by examining several areas in which the application of Fourth Amendment concepts to computer searches and/or seizures can be problematic. In order to illustrate this point, the article will build on a hypothetical. The hypothetical situation assumes law enforcement officers have lawfully obtained a warrant to search for and seize evidence concerning the commission of one or more crimes. It will also be assumed that computer technology played some role in the commission of these crimes, so computer equipment and …


How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos Jan 2002

How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos

Northwestern Journal of International Law & Business

The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …


Humans, Computers, And Binding Commitment, Margaret Jane Radin Oct 2000

Humans, Computers, And Binding Commitment, Margaret Jane Radin

Indiana Law Journal

Addison C. Harris Lecture at the Indiana University School of Law-Bloomington on October 26, 1999.


The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli Apr 1996

The Computer As Advocate: An Approach To Computer-Generated Displays In The Courtroom, Mario Borelli

Indiana Law Journal

No abstract provided.


Smart Agenting, Barry Diller Dec 1994

Smart Agenting, Barry Diller

Federal Communications Law Journal

No abstract provided.


Defining Computer Program Parts Under Learned Hand's Abstractions Test In Software Copyright Infringement Cases, John W.L. Ogilive Dec 1992

Defining Computer Program Parts Under Learned Hand's Abstractions Test In Software Copyright Infringement Cases, John W.L. Ogilive

Michigan Law Review

This Note proposes a set of computer program part definitions that develop Learned Hand's abstractions test to make it more useful in software infringement cases. The Note takes no position on the proper scope of protection for software under copyright law, but argues that no consensus is possible on which program parts deserve copyright protection until courts recognize that computer programs are composed of components whose definition lies beyond judicial control. Program parts defined in conclusory legal terms will never provide a stable basis for reasoned debate over the conclusions presumed in the definitions.


Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers Jan 1988

Computer Malpractice And Other Legal Problems Posed By Computer Vaporware, Ronald N. Weikers

Villanova Law Review

No abstract provided.


Consumer Meets Computer: An Argument For Liberal Trademark Protection Of Computer Hardware Configurations Under Section 43(A) Of The Lanham Trademark Act Jan 1987

Consumer Meets Computer: An Argument For Liberal Trademark Protection Of Computer Hardware Configurations Under Section 43(A) Of The Lanham Trademark Act

Washington and Lee Law Review

No abstract provided.


Language, Communication, Computers And The Law, R. A. Samek Jun 1985

Language, Communication, Computers And The Law, R. A. Samek

Dalhousie Law Journal

There is an old story about a drunken man who is looking for an object under a street light. A policeman asks him what he is looking for. "It is my keys", he says. "Did you lose them here?" "No, over there.'" "Why then are you looking for them over here?" "Because I can see here", is the man's reply. The real significance of this story is very different from what it appears. It is not the man who is foolish but the policeman. We can only look for something from where we can see it. The alternative is to …


The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen Oct 1984

The Patentability Of Computer Programs: Merrill Lynch's Patent For A Financial Services System, Lynne B. Allen

Indiana Law Journal

No abstract provided.


Computer Retrieval – Drawing The Line?, Paul Thomas May 1984

Computer Retrieval – Drawing The Line?, Paul Thomas

Dalhousie Law Journal

The Master of the Rolls in England, Sir John Donaldson, said recently that he feared the use of a proliferation of useless materials from computers in presentations before the Court. He was probably echoing what Lord Diplock had to say for the House of Lords in Roberts Petroleum Ltd. v. Bernard Kenny Ltd. (in liquidation).1 In a lengthy per curiam speech, Lord Diplock in that case commented on the use sought to be made in the House of Lords and the Court of Appeal of previous unreported Court of Appeal judgments. The transcripts of shorthand notes of oral judgments rendered …


Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski Jan 1984

Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski

Michigan Journal of International Law

There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.


The International Application Of The Second Computer Inquiry, Robert M. Frieden Jan 1984

The International Application Of The Second Computer Inquiry, Robert M. Frieden

Michigan Journal of International Law

This article chronicles the FCC's attempt to confront the confluence of telecommunications and data processing technologies by fashioning a regulatory scheme designed primarily for the United States. The Commission has chosen to apply this scheme, without significant qualification, internationally. Given the different objectives and structure of United States and foreign communications industries, the FCC's system cannot be transplanted abroad without prior consultation and substantial modification. After reviewing the international problems created by the Commission's application abroad of its newly developed scheme, this article concludes with recommendations for resolving these conflicts that currently threaten the well-being of carriers, customers, and international …


Direct Television Broadcasting And The Quest For Communication Equality, Howard C. Anawalt Jan 1984

Direct Television Broadcasting And The Quest For Communication Equality, Howard C. Anawalt

Michigan Journal of International Law

In the immediate past modem communication means such as efficient telephone and television systems have been viewed as the luxuries of well developed economies. Rapid advances in the field of communications and computer technologies have changed this basic outlook. Now, it is possible to use these technologies as tools of economic growth in both developed and developing countries. This is primarily because cost has gone down while efficiency has gone up. A recent article concerning small computers demonstrates the point. "If the aircraft industry had developed as spectacularly as the computer industry over the past twenty-five years, a Boeing 767 …


The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review Nov 1972

The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review

Michigan Law Review

Since the advent of computer technology, data processing and communication services have become increasingly interdependent. In 1966, the Federal Communications Commission launched the Computer Inquiry to explore the broad range of regulatory and policy problems generated by this technological development.2


Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller Apr 1969

Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller

Michigan Law Review

The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …