Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Series

Technology

Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 42

Full-Text Articles in Law

Kafka In The Age Of Ai And The Futility Of Privacy As Control, Daniel Solove, Woodrow Hartzog Jan 2024

Kafka In The Age Of Ai And The Futility Of Privacy As Control, Daniel Solove, Woodrow Hartzog

Faculty Scholarship

Despite writing more than a century ago, Franz Kafka captured the core problem of digital technologies—how individuals are rendered powerless and vulnerable. Over the past fifty years, and especially in the twenty-first century, privacy laws have been sprouting up around the world. These laws are often based heavily on an Individual Control Model that aims to empower individuals with rights to help them control the collection, use, and disclosure of their data.

In this Article, we argue that although Kafka starkly shows us the plight of the disempowered individual, his work also paradoxically suggests that empowering the individual isn’t the …


How To Understand China's Approach To Central Bank Digital Currency?, Heng Wang Sep 2023

How To Understand China's Approach To Central Bank Digital Currency?, Heng Wang

Research Collection Yong Pung How School Of Law

China's central bank digital currency (CBDC), digital yuan or e-CNY, is likely to profoundly affect the international financial system. China's CBDC is fast evolving. Understanding the influencing factors of China's CBDC will likely be crucial to explore its future direction. Major influencing factors include (i) China's perception and conception of regulation and technology, (ii) complementarity between China's preferences and CBDC development, (iii) domestic and international legitimacy, and (iv) institutional development. This paper argues that these influencing factors contribute to China's likely approach of selectively reshaping the international financial system. Given the potential wide-ranging implications of the introduction of CBDC globally, …


Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel Mar 2023

Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel

Joint PIJIP/TLS Research Paper Series

The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.


Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon Nov 2022

Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon

Faculty Scholarship

The use of artificial intelligence to help editors examine law review submissions may provide a way to improve an overburdened system. This Article is the first to explore the promise and pitfalls of using artificial intelligence in the law review submissions process. Technology-assisted review of submissions offers many possible benefits. It can simplify preemption checks, prevent plagiarism, detect failure to comply with formatting requirements, and identify missing citations. These efficiencies may allow editors to address serious flaws in the current selection process, including the use of heuristics that may result in discriminatory outcomes and dependence on lower-ranked journals to conduct …


Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars Nov 2022

Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars

Faculty Scholarship

Many pressing societal questions can be answered only by bringing experts from different disciplines together. Questions around misinformation and disinformation, platform power, surveillance capitalism, information privacy, and algorithmic bias, among many others, reside at the intersection of computer science and law. We need to develop institutions that bring together computer scientists and legal scholars to work together on issues like these, and to train new innovators, thought leaders, counselors, and policymakers with hybrid training in both disciplines. In Universities, the disciplines of Computer Science (CS) and Law are separated by many wide chasms. Differences in standards, language, methods, and culture …


Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer Oct 2022

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer

Elisabeth Haub School of Law Faculty Publications

This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.

Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


A Unified Theory Of Data, William Magnuson Feb 2021

A Unified Theory Of Data, William Magnuson

Faculty Scholarship

How does the proliferation of data in our modern economy affect our legal system? Scholars that have addressed the question have nearly universally agreed that the dramatic increases in the amount of data available to companies, as well as the new uses to which that data is being put, raise fundamental problems for our regulatory structures. But just what those problems might be remains an area of deep disagreement. Some argue that the problem with data is that current uses lead to discriminatory results that harm minority groups. Some argue that the problem with data is that it impinges on …


Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai Jan 2021

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai

Articles

Artificial intelligence and machine learning represent powerful tools in many fields, ranging from criminal justice to human biology to climate change. Part of the power of these tools arises from their ability to make predictions and glean useful information about complex real-world systems without the need to understand the workings of those systems.


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Artificial Financial Intelligence, William Magnuson Jul 2020

Artificial Financial Intelligence, William Magnuson

Faculty Scholarship

Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in …


Networks Of Empathy, Thomas E. Kadri Jan 2020

Networks Of Empathy, Thomas E. Kadri

Scholarly Works

Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusive conduct like stalking and harassment, manipulating digital tools to control and harm their victims. By some accounts, 95% of domestic-abuse cases involve technology, while a sizeable chunk of the U.S. population now admits to having suffered or perpetrated serious abuse online. To make matters worse, people often trivialize digital abuse or underestimate its prevalence. Even among those who do appreciate its severity, there remains ample disagreement about how to address it.

Although law can be a powerful tool to regulate digital abuse, legal responses are …


Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow Sep 2019

Review Of Ian Kerr And Jane Bailey, The Implications Of Digital Rights Management For Privacy And Freedom Of Expression, 2 Journal Of Information, Communication & Ethics In Society 87 (2004), Ann Bartow

Law Faculty Scholarship

Ian Kerr, who passed away far too young in 2019, was an incisive scholar and a much treasured colleague. The wit that sparkled in his papers was matched only by his warmth toward his friends, of whom there were many. He and his many co-authors wrote with deep insight and an equally deep humanity about copyright, artificial intelligence, privacy, torts, and much much more.

Ian was also a valued contributor to the Jotwell Technology Law section. His reviews here display the same playful generosity that characterized everything else he did. In tribute to his memory, we are publishing a memorial …


Authors And Machines, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2019

Authors And Machines, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

Machines, by providing the means of mass production of works of authorship, engendered copyright law. Throughout history, the emergence of new technologies tested the concept of authorship, and courts in response endeavored to clarify copyright’s foundational principles. Today, developments in computer science have created a new form of machine, the “artificially intelligent” (AI) system apparently endowed with “computational creativity.” AI systems introduce challenging variations on the perennial question of what makes one an “author” in copyright law: Is the creator of a generative program automatically the author of the works her process begets, even if she cannot anticipate the contents …


Lessons From Literal Crashes For Code, Margot Kaminski Jan 2019

Lessons From Literal Crashes For Code, Margot Kaminski

Publications

No abstract provided.


Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan Jan 2019

Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan

Articles in Law Reviews & Other Academic Journals

You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.

Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …


Data Generated By New Technologies And The Law: A Guide For Massachusetts Practitioners, Andrew Sellars Jan 2019

Data Generated By New Technologies And The Law: A Guide For Massachusetts Practitioners, Andrew Sellars

Faculty Scholarship

This brief paper, created as part of a training on new technologies and evidence for MCLE New England, outlines the standards used to compel disclosure of information under the Stored Communication Act, and reviews the types of data stored on various consumer devices and their likely custodians, as well as cases and notes relevant to each devices. The paper serves as a quick introduction and checklist for those considering gathering information from these devices in the course of investigations in Massachusetts. The devices outlined include cell phones, social media platforms, secure messaging services, fitness trackers, home assistant devices (or "smart …


Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips Jan 2018

Innovation And Tradition: A Survey Of Intellectual Property And Technology Legal Clinics, Cynthia L. Dahl, Victoria F. Phillips

All Faculty Scholarship

For artists, nonprofits, community organizations and small-business clients of limited means, securing intellectual property rights and getting counseling involving patent, copyright and trademark law are critical to their success and growth. These clients need expert IP and technology legal assistance, but very often cannot afford services in the legal marketplace. In addition, legal services and state bar pro bono programs have generally been ill-equipped to assist in these more specialized areas. An expanding community of IP and Technology clinics has emerged across the country to meet these needs. But while law review articles have described and examined other sectors of …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews May 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

All Faculty Scholarship

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Fetishizing Copies, Jessica Litman Jan 2017

Fetishizing Copies, Jessica Litman

Book Chapters

Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Regulating Software When Everything Has Software, Paul Ohm, Blake Reid Jan 2016

Regulating Software When Everything Has Software, Paul Ohm, Blake Reid

Publications

This Article identifies a profound, ongoing shift in the modern administrative state: from the regulation of things to the regulation of code. This shift has and will continue to place previously isolated agencies in an increasing state of overlap, raising the likelihood of inconsistent regulations and putting seemingly disparate policy goals, like privacy, safety, environmental protection, and copyright enforcement, in tension. This Article explores this problem through a series of case studies and articulates a taxonomy of code regulations to help place hardware-turned-code rules in context. The Article considers the likely turf wars, regulatory thickets, and related dynamics that are …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown Jan 2011

Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown

Law Librarian Scholarship

CiteGenie works primarily for caselaw and Internet resource research but is experimenting with the ability to add citations for statutes and regulations. CiteGenie provides a number of formatting options and allows you to choose citation rules for a particular state, use parallel citations, remove star-pagination marks from quoted texts, and personalize abbreviations. This tool is easy to use; when researching in Firefox, select CiteGenie from the right-click menu and a pop-up displays the copied text and citation to be pasted.


Elawyering And The Future Of Legal Work, Richard Granat, Blair Janis, Stephanie Kimbro, Marc Lauritsen Apr 2010

Elawyering And The Future Of Legal Work, Richard Granat, Blair Janis, Stephanie Kimbro, Marc Lauritsen

Continuing Legal Education (CLE) Lecture Series

eLawyering is doing legal work – not just marketing it – over the Web. Pioneering practitioners have found dramatic new ways to communicate and collaborate with clients and other lawyers, produce documents, settle disputes, interact with courts, and manage legal knowledge. There are exciting initiatives underway now that deserve attention by all lawyers – present and future. The legal profession is being disrupted from without and from within. To be successful in the coming era, lawyers will need to know how to practice over the Web, manage client relationships in cyberspace, and offer “unbundled” services. This program discusses the knowledge …


Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio Jan 2010

Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio

Faculty Scholarship

No abstract provided.


Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley Jan 2010

Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley

Faculty Scholarship

“Cloud computing” - the ability to create, store, and manipulate data through Web-based services - is growing in popularity. Cloud computing itself may not transform society; for most consumers, it is simply an appealing alternative tool for creating and storing the same records and documents that people have created for years. However, outdated laws and varying corporate practices mean that documents created and stored in the cloud may not have the same protections as the same documents stored in a filing cabinet or on a home computer. Can cloud computing services protect the privacy of their consumers? Do they? And …