Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Law

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Privacy Statements Under The Gdpr, Mike Hintze Apr 2019

Privacy Statements Under The Gdpr, Mike Hintze

Seattle University Law Review

The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …


Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett Apr 2019

Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett

Seattle University Law Review

In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado Sep 2017

Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado

Journal of Digital Forensics, Security and Law

Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic …


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Dec 2014

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

Elizabeth A Rowe

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr. Jan 2012

It's Time For A Good Hard Look In The Mirror: The Corporate Law Example, John A. Barrett, Jr.

Fordham Journal of Corporate & Financial Law

This Article asserts that the move from the industrial age to the

information age represents a fundamental change to our society on

such a widespread basis that the legal order must reexamine the

premises about how our society functions, assessing whether

foundational elements of U.S. Common Law remain valid. This

Article first confronts briefly the continuing acceptance of certain

foundational premises in contract and intellectual property law,

illustrating that such premises are no longer supported by the

realities of modern society. With fundamental change challenging

multiple areas of law in the information age, this problem is worthy

of widespread inquiry …


Property As Control: The Case Of Information, Jane B. Baron Jan 2012

Property As Control: The Case Of Information, Jane B. Baron

Michigan Telecommunications & Technology Law Review

If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …


Databases And Dynamism, Michal Shur-Ofry Feb 2011

Databases And Dynamism, Michal Shur-Ofry

University of Michigan Journal of Law Reform

Databases are generally perceived in legal scholarship as static warehouses, storing up valuable facts and information. Accordingly, scholarship on copyright protection of databases typically concentrates on the social need to access their content. This Article seeks to shift the focus of the debate, arguing that the copyrightdatabases debate is not merely a static "access to information" story. Instead, it is a dynamic story of relations, hierarchies, and interactions between pieces of information, determined by database creators. It is also a story of patterns, categories, selections, and taxonomies that are often invisible to the naked eye, but that influence our perceptions …


Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe Jan 2009

Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe

UF Law Faculty Publications

This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes Sep 2005

'Code' And The Slow Erosion Of Privacy, Bert-Jaap Koops, Ronald Leenes

Michigan Telecommunications & Technology Law Review

The notion of software code replacing legal code as a mechanism to control human behavior--"code as law"--is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of "code as law" on privacy. To what extent is privacy-related "code" being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it …


An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann Apr 2005

An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann

ExpressO

In this article, Professor Frischmann combines a number of current debates across many disciplinary lines, all of which examine from different perspectives whether certain resources should be managed through a regime of private property or through a regime of open access. Frischmann develops and applies a theory that demonstrates there are strong economic arguments for managing and sustaining openly accessible infrastructure. The approach he takes differs from conventional analyses in that he focuses extensively on demand-side considerations and fully explores how infrastructure resources generate value for consumers and society. As a result, the theory brings into focus the social value …


Information Wants To Be Free, But The Packaging Is Going To Cost You, Gregory A. Stobbs Jun 1996

Information Wants To Be Free, But The Packaging Is Going To Cost You, Gregory A. Stobbs

Michigan Telecommunications & Technology Law Review

The question is this: where do we draw the line between private ownership and the public domain? It is not a question of choosing between copyright and patent, of choosing between hardware and software, or of choosing between implementation and algorithm. It is a more fundamental question that reaches back to ancient human values and transcends our current fixation on computers and software. It helps to put things in perspective. When debating where we and the law are headed (as we are now), it helps to know where we have been. In this regard, do not assume that software patents …


The Quest For Enabling Metaphors For Law And Lawyering In The Information Agae, Pamela Samuelson May 1996

The Quest For Enabling Metaphors For Law And Lawyering In The Information Agae, Pamela Samuelson

Michigan Law Review

A Review of James Boyle, Shamans, Software, and Spleens: Law and the Construction of the Information Society and M. Ethan Katsh, Law in a Digital World


Smart Agenting, Barry Diller Dec 1994

Smart Agenting, Barry Diller

Federal Communications Law Journal

No abstract provided.


Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski Jan 1984

Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski

Michigan Journal of International Law

There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.


The International Application Of The Second Computer Inquiry, Robert M. Frieden Jan 1984

The International Application Of The Second Computer Inquiry, Robert M. Frieden

Michigan Journal of International Law

This article chronicles the FCC's attempt to confront the confluence of telecommunications and data processing technologies by fashioning a regulatory scheme designed primarily for the United States. The Commission has chosen to apply this scheme, without significant qualification, internationally. Given the different objectives and structure of United States and foreign communications industries, the FCC's system cannot be transplanted abroad without prior consultation and substantial modification. After reviewing the international problems created by the Commission's application abroad of its newly developed scheme, this article concludes with recommendations for resolving these conflicts that currently threaten the well-being of carriers, customers, and international …


Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller Apr 1969

Personal Privacy In The Computer Age: The Challenge Of A New Technology In An Information-Oriented Society, Arthur R. Miller

Michigan Law Review

The purpose of this Article is to survey the new technology's implications for personal privacy and to evaluate the contemporary common-law and statutory pattern relating to data-handling. In the course of this examination, it will appraise the existing framework's capacity to deal with the problems created by society's growing awareness of the primordial character of information. The Article is intended to be suggestive; any attempt at definitiveness would be premature. Avowedly, it was written with the bias of one who believes that the new information technology has enormous long-range societal implications and who is concerned about the consequences of the …