Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Cornell University Law School (5)
- Roger Williams University (4)
- Boston University School of Law (2)
- University of Colorado Law School (2)
- University of Maryland Francis King Carey School of Law (2)
-
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- Barry University School of Law (1)
- Columbia Law School (1)
- Notre Dame Law School (1)
- Schulich School of Law, Dalhousie University (1)
- University of Cincinnati College of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of North Carolina School of Law (1)
- Keyword
-
- Privacy (4)
- Copyright (3)
- Artificial intelligence (2)
- Computer Fraud and Abuse Act (2)
- Computer Law (2)
-
- Cybercrime (2)
- Hacking (2)
- Internet (2)
- Law (2)
- Robots (2)
- Search (2)
- Stored Communications Act (2)
- Technology (2)
- Accuracy (1)
- Administrative law (1)
- Amici curiae (1)
- Android (1)
- Anti-fragmentation agreement (AFA) (1)
- Art (1)
- Article III (1)
- Artificial intellgence (1)
- Autonomy (1)
- Big Data (1)
- Bitcoin (1)
- Blockchain (1)
- Border (1)
- Breach (1)
- Business law (1)
- CFAA (1)
- COPPA (1)
Articles 1 - 26 of 26
Full-Text Articles in Law
Rwu First Amendment Blog: David Logan's Blog: When Facts And News Diverge 12-2-2016, David A. Logan
Rwu First Amendment Blog: David Logan's Blog: When Facts And News Diverge 12-2-2016, David A. Logan
Law School Blogs
No abstract provided.
Consenting To Computer Use, James Grimmelmann
Consenting To Computer Use, James Grimmelmann
Cornell Law Faculty Publications
The federal Computer Fraud and Abuse Act (CFAA) makes it a crime to “access a computer without authorization or exceed authorized access.” Courts and commentators have struggled to explain what types of conduct by a computer user are “without authorization.” But this approach is backwards; authorization is not so much a question of what a computer user does, as it is a question of what a computer owner allows.
In other words, authorization under the CFAA is an issue of consent, not conduct; to understand authorization, we need to understand consent. Building on Peter Westen’s taxonomy of consent, I argue …
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
All Faculty Scholarship
Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …
Circumvention Of Geoblocking, Marketa Trimble
Circumvention Of Geoblocking, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble gave her presentation Circumvention of Geoblocking at the "Law, Borders, and Speech" conference, held at Stanford Law School on Oct. 24, 2016.
Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter
Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter
Faculty Publications
Libraries collaborate to digitize collections large and small in order to provide information with fewer geographical, temporal, or socio-economic barriers. These collaborations promise economy of scale and breadth of impact, both for access to content and for preservation of decaying print source material. Some suggest this increased access to information through the digital environment comes at the expense of reader privacy, a value that United States librarians have advanced for nearly eighty years. Multiplying risks to digital reader privacy are said to weaken librarians’ commitment to privacy of library use and to overwhelm libraries’ ability to ensure confidential access to …
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham
Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham
Faculty Scholarship
Bitcoin is the world’s first peer-to-peer cryptocurrency. VATCoin is similar, but it is used in tax compliance. Both Bitcoin and VATCoin are distributive ledger applications built upon blockchain technology. Bitcoin’s ledger is public; VATCoin’s is private. If adopted, VATCoin could well become the world’s first government-mandated cryptotaxcurrency. Unlike Bitcoin, VATCoin will not be a speculative currency. It is always fixed to the home currency.
This paper proposes that the Gulf Cooperation Council (GCC) adopt VATCoin in its VAT Framework. The GCC is expected to have multiple 5% VATs in place by January 1, 2018. There is an ample amount of …
Newsroom: Monestier On Web Jurisdiction 7/22/2016, Pat Murphy, Roger Williams University School Of Law
Newsroom: Monestier On Web Jurisdiction 7/22/2016, Pat Murphy, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton
Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton
Cornell Law Faculty Publications
In "Against Data Exceptionalism," Andrew K. Woods explores “one of the greatest societal and technological shifts in recent years,” which manifests in the “same old” questions about government power. The global cloud is an important feature of modern technological life that has significant consequences for individual privacy, law enforcement, and governance. Yet, as Woods suggests, the legal challenges presented by the cloud have analogies in age-old puzzles of public and private international law.
Identifying these connections is a conceptual advance, and this contribution should not be understated. But, to my mind, the most telling statement in Woods’s excellent article comes …
Democratizing Startups, Seth C. Oranburg
Democratizing Startups, Seth C. Oranburg
Law Faculty Scholarship
President Obama signed the Jumpstart Our Business Startups (“JOBS Act”) of 2012 into law to “help entrepreneurs raise the capital they need to put Americans back to work and create an economy that’s built to last.” The goal is to “democratize startups” by making capital available to diverse entrepreneurs in new geographies. Yet the net effect of securities regulations and market conditions is the opposite. Startup companies are encouraged to stay private so capital is consolidating in large, mature firms instead of recycling into new startups. Evidence of consolidation is that once-rare “Unicorns” (billion-dollar startups) now number at least 170. …
How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon
How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon
Faculty Scholarship
In Oracle v. Google (2015), the Federal Circuit addressed whether the " method header " components of a dominant computer program were uncopyrightable as " merging " with the headers' ideas or function. Google had copied the headers to ease the ability of third-party programmers to interact with Google's Android platform. The court rebuffed the copyrightability challenge; it reasoned that because the plaintiff's expression might have been written in alternative forms, there was no " merger " of idea and expression. But the Oracle court may have been asking the wrong question. In Lotus v. Borland (1995), the owner of …
Reauthorizing The Fisa Amendments Act: A Blueprint For Enhancing Privacy Protections And Preserving Foreign Intelligence Capabilities, Peter Margulies
Reauthorizing The Fisa Amendments Act: A Blueprint For Enhancing Privacy Protections And Preserving Foreign Intelligence Capabilities, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Small Companies, Big Breaches: Why Current Data Protection Laws Fail American Consumers In Cases Of Third-Party Hacking, Kaylie Gioioso
Small Companies, Big Breaches: Why Current Data Protection Laws Fail American Consumers In Cases Of Third-Party Hacking, Kaylie Gioioso
Proxy
No abstract provided.
Modularity Theory And Internet Regulation, Christopher S. Yoo
Modularity Theory And Internet Regulation, Christopher S. Yoo
All Faculty Scholarship
Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.
The literature on innovation indicates that modules should be determined by the nature of …
Copyright For Literate Robots, James Grimmelmann
Copyright For Literate Robots, James Grimmelmann
Cornell Law Faculty Publications
Almost by accident, copyright has concluded that copyright law is for humans only: reading performed by computers doesn't count as infringement. Conceptually, this makes sense: copyright's ideal of romantic readership involves humans writing for other humans. But in an age when more and more manipulation of copyrighted works is carried out by automated processes, this split between human reading (infringement) and robotic reading (exempt) has odd consequences and creates its own tendencies toward a copyright system in which humans occupy a surprisingly peripheral place. This essay describes the shifts in fair use law that brought us here and reflects on …
If It’S Broke, Fix It: Fixing Fixation, Megan M. Carpenter
If It’S Broke, Fix It: Fixing Fixation, Megan M. Carpenter
Law Faculty Scholarship
The fixation requirement, once an intended instrument for added flexibility in copyrightability, has become an unworkable standard under modern copyright law. The last twenty-five years have witnessed a dramatic expansion in creative media. Developments in both digital media and contemporary art have challenged what it means to be fixed, and cases dealing with these works reveal how inapposite current interpretations of fixation are for these forms of expression. Yet, getting fixation “right” is important, for it is often the juridical threshold over which idea becomes expression. Thus, we must enable fixation to help define the parameters of creative expression while …
A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia
A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia
Journal Articles
Thirty years ago, Congress passed the Computer Fraud and Abuse Act (CFAA) to combat the emerging problem of computer crime. The statute’s core prohibitions targeted one who “accesses” a computer “without authorization” or who “exceeds authorized access.” Over time, incremental statutory changes and large-scale technical changes have dramatically expanded the potential scope of the CFAA. The question of what constitutes unauthorized access has taken on far greater significance than it had thirty years ago, and courts remain deeply divided on this question. This Article explores the text, purpose, and history of the CFAA, as well as a range of normative …
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
Faculty Scholarship
No abstract provided.
A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley
A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley
Faculty Scholarship
Rauterberg & Talley (2017) develop a data set of “corporate opportunity waivers” (COWs) – significant contractual modifications of fiduciary duties – sampled from SEC filings. Part of their analysis utilizes a machine learning (ML) classifier to extend their data set beyond the hand-coded sample. Because the ML approach is likely unfamiliar to some readers, and in the light of its great potential across other areas of law and finance research, this note explains the basic components using a simple example, and it demonstrates strategies for calibrating and evaluating the classifier.
Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank
Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank
Faculty Articles and Other Publications
In data breach cases, the lower federal courts have split on the question of whether the plaintiffs meet Article III standing requirements for injury and causation. In its 2013 decision Clapper v. Amnesty International USA, the Supreme Court, in a case involving alleged electronic surveillance by the U.S. government’s National Security Agency, declared that a plaintiff alleging that it will suffer future injuries from a defendant’s allegedly improper conduct must show that such injuries are “certainly impending.” Since the Clapper decision, a majority of the lower federal courts addressing “lost data” or potential identity theft cases in which there is …
Regulating Software When Everything Has Software, Paul Ohm, Blake Reid
Regulating Software When Everything Has Software, Paul Ohm, Blake Reid
Publications
This Article identifies a profound, ongoing shift in the modern administrative state: from the regulation of things to the regulation of code. This shift has and will continue to place previously isolated agencies in an increasing state of overlap, raising the likelihood of inconsistent regulations and putting seemingly disparate policy goals, like privacy, safety, environmental protection, and copyright enforcement, in tension. This Article explores this problem through a series of case studies and articulates a taxonomy of code regulations to help place hardware-turned-code rules in context. The Article considers the likely turf wars, regulatory thickets, and related dynamics that are …
Territoriality, Technology, And National Security, Zachary D. Clopton
Territoriality, Technology, And National Security, Zachary D. Clopton
Cornell Law Faculty Publications
Across various contexts, parties and courts have pressed for territorial rules in cases implicating technology and national security. This Essay suggests that presumptively territorial approaches to these questions are misguided. Territorial rules do not track the division of authority or capacity among the branches, nor are they effective proxies for the important interests of regulators or regulatees. On issues of technology and national security, territorial rules seem particularly ill suited: territorial rules aspire to certainty, but technology makes it harder to define “territoriality” in a consistent and predictable way; technology weakens territoriality as a proxy for policy goals because data …
There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann
There's No Such Thing As A Computer-Authored Work - And It's A Good Thing, Too, James Grimmelmann
Cornell Law Faculty Publications
Treating computers as authors for copyright purposes is a non-solution to a non-problem. It is a non-solution because unless and until computer programs can qualify as persons in life and law, it does no practical good to call them "authors" when someone else will end up owning the copyright anyway. And it responds to a non-problem because there is nothing actually distinctive about computer-generated works.
There are five plausible ways in which computer-generated works might be considered meaningfully different from human-generated works: (1) they are embedded in digital copies, (2) people create them using computers rather than by hand, (3) …
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie
Electronic Devices At The Border: The Next Frontier Of Canadian Search And Seizure Law?, Robert Currie
Articles, Book Chapters, & Popular Press
Over the last several years the Supreme Court of Canada has developed its jurisprudence regarding the search and seizure of electronic devices, applying section 8 of the Canadian Charter of Rights and Freedoms in such a way as to assert and protect a significant amount of privacy in the devices and their data. Recent cases regarding the search of devices at Canada’s borders, however, do not reflect this case law. This is a situation made all the more complex by the generally attenuated expectation of privacy in the border context, and is worthy of inquiry. Using a pending border case …
The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron
The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron
Faculty Scholarship
No abstract provided.
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Publications
Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …