Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

PDF

2016

Institution
Keyword
Publication
Publication Type

Articles 181 - 192 of 192

Full-Text Articles in Law

Plugging The Rabbit Hole: The Supreme Court's Decision In Alice, Steven Swan Jan 2016

Plugging The Rabbit Hole: The Supreme Court's Decision In Alice, Steven Swan

Utah Law Review

The two-step analysis in Mayo is insufficient to objectively analyze and make consistent determinations on patent eligibility. The effects of Alice are prime exhibits of this conclusion. Uncertainty and confusion in the realm of patents and software technology have risen to such a level that there is a telling impact on the economy and perhaps far greater devastation to the economy on the horizon. At the same time, the patent prosecution process has become increasingly expensive and difficult for both the client and drafting attorney provided the sheer number of Section rejections that are challenging to overcome. Consequently, this Note …


A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir Jan 2016

A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir

Indiana Law Journal

Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.

Our survey is the first comprehensive examination of the intersection of …


There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann Jan 2016

There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann

Cornell Law Faculty Publications

Treating computers as authors for copyright purposes is a non-solution to a non-problem. It is a non-solution because unless and until computer programs can qualify as persons in life and law, it does no practical good to call them "authors" when someone else will end up owning the copyright anyway. And it responds to a non-problem because there is nothing actually distinctive about computer-generated works.

There are five plausible ways in which computer-generated works might be considered meaningfully different from human-generated works: (1) they are embedded in digital copies, (2) people create them using computers rather than by hand, (3) …


What's In The Box? Re-Conceptualizing Computers As Containers, Metadata As Contents Of That Container, And Applying Fourth Amendment Protections, Christopher Michels Jan 2016

What's In The Box? Re-Conceptualizing Computers As Containers, Metadata As Contents Of That Container, And Applying Fourth Amendment Protections, Christopher Michels

Criminal Law Practitioner

No abstract provided.


Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie Jan 2016

Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie

Articles, Book Chapters, & Popular Press

Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …


The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve Jan 2016

The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve

St. Mary's Law Journal

Abstract forthcoming.


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron Jan 2016

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Jan 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Publications

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Employee Electronic Communications In A Boundaryless World, Robert Sprague Dec 2015

Employee Electronic Communications In A Boundaryless World, Robert Sprague

Robert Sprague

In 2007, the National Labor Relations Board decided that an employer could maintain an email communications policy that prohibits nonwork-related messages, even if those messages involved communications otherwise protected under the National Labor Relations Act. In December 2014, the National Labor Relations Board reversed this holding, but in doing so, limited its decision to just workplace email. This article argues that such a prescription is outdated and archaic in light of today’s modern workplace filled with communications devices and systems that blur the distinction between work and personal life. This article explains that such a prescription can cause employees to …


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.


Private Technology (Foreword), Daniel Harris Brean Dec 2015

Private Technology (Foreword), Daniel Harris Brean

Daniel Harris Brean

Privacy and technology issues tend to implicate one another. Sometimes they reinforce each other, such as when improved data security thwarts hackers. But often the use of technology diminishes privacy because, in order to benefit from the technology, users must surrender some personal, otherwise private information. In such cases the technology may be powerful, profitable, fun, or convenient, but the privacy consequences of its use can be quite profound.


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …