Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Common Sense Recommendations For The Application Of Tax Law To Digital Assets, Linda M. Beale, Jeremy Bearer-Friend, Jennifer Bird-Pollan, Samuel D. Brunson, Luís Calderón Gómez, Bryan Camp, Adam Chodorow, Mark Cochran, Lin William Cong, Matthew Foreman, Phil Gaudiano, I. Richard Gershon, Nathan C. Goldman, Jillian Grennan, Megan Justice, Young Ran (Christine) Kim, Herbert I. Lazerow, Tao Li, Lawrence Lokken, Omri Y. Marian, Orly Mazur, Stephanie Hunter Mcmahon, Tyler Menzer, Matt Metras, Ann M. Murphy, Henry Ordower, Amanda Parsons, Daniel Rabetti, Alex Raskolnikov, Tracey M. Roberts, Kerry A. Ryan, Edward A. Zelinsky Jan 2023

Common Sense Recommendations For The Application Of Tax Law To Digital Assets, Linda M. Beale, Jeremy Bearer-Friend, Jennifer Bird-Pollan, Samuel D. Brunson, Luís Calderón Gómez, Bryan Camp, Adam Chodorow, Mark Cochran, Lin William Cong, Matthew Foreman, Phil Gaudiano, I. Richard Gershon, Nathan C. Goldman, Jillian Grennan, Megan Justice, Young Ran (Christine) Kim, Herbert I. Lazerow, Tao Li, Lawrence Lokken, Omri Y. Marian, Orly Mazur, Stephanie Hunter Mcmahon, Tyler Menzer, Matt Metras, Ann M. Murphy, Henry Ordower, Amanda Parsons, Daniel Rabetti, Alex Raskolnikov, Tracey M. Roberts, Kerry A. Ryan, Edward A. Zelinsky

All Faculty Scholarship

In response to the Joint Committee on Taxation’s July 2023 request for comments on application of various Internal Revenue Code sections on digital assets, we propose a consistent set of rules to apply current law to digital assets. We highlight that the underlying economics and characteristics of transactions should be the primary concern for the application of rules and the valuation of digital assets. We believe any digital asset rules should (1) treat classes of digital assets with unique characteristics differently based on their economics, (2) minimize incentives for users to engage in tax-motivated structuring of transactions, and (3) allow …


Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim Jan 2022

Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim

Reports & Public Policy Documents

The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …


The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter S. Menell Jan 2021

The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter S. Menell

Faculty Scholarship

Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Productions, Inc. v. McDonald’s Corp. ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonald’s characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding software code. …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Artificial Intelligence And Law: An Overview, Harry Surden Jan 2019

Artificial Intelligence And Law: An Overview, Harry Surden

Publications

Much has been written recently about artificial intelligence (AI) and law. But what is AI, and what is its relation to the practice and administration of law? This article addresses those questions by providing a high-level overview of AI and its use within law. The discussion aims to be nuanced but also understandable to those without a technical background. To that end, I first discuss AI generally. I then turn to AI and how it is being used by lawyers in the practice of law, people and companies who are governed by the law, and government officials who administer the …


Will Artificial Intelligence Eat The Law? The Rise Of Hybrid Social-Ordering Systems, Tim Wu Jan 2019

Will Artificial Intelligence Eat The Law? The Rise Of Hybrid Social-Ordering Systems, Tim Wu

Faculty Scholarship

Software has partially or fully displaced many former human activities, such as catching speeders or flying airplanes, and proven itself able to surpass humans in certain contests, like Chess and Jeopardy. What are the prospects for the displacement of human courts as the centerpiece of legal decision-making? Based on the case study of hate speech control on major tech platforms, particularly on Twitter and Facebook, this Essay suggests displacement of human courts remains a distant prospect, but suggests that hybrid machine – human systems are the predictable future of legal adjudication, and that there lies some hope in that combination, …


Bridges Ii: The Law--Stem Alliance & Next Generation Innovation, Harry Surden Jan 2018

Bridges Ii: The Law--Stem Alliance & Next Generation Innovation, Harry Surden

Publications

Technological change recently has altered business models in the legal field, and these changes will continue to affect the practice of law itself. How can we, as educators, prepare law students to meet the challenges of new technology throughout their careers?


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino Oct 2012

Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino

FIMS Presentations

No abstract provided.


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh Jan 2004

Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh

All Faculty Scholarship

Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …