Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Fordham Law School (26)
- Selected Works (18)
- Georgetown University Law Center (15)
- Boston University School of Law (14)
- Maurer School of Law: Indiana University (6)
-
- University of Pennsylvania Carey Law School (6)
- Schulich School of Law, Dalhousie University (5)
- SelectedWorks (5)
- Marquette University Law School (4)
- Pace University (4)
- University of Michigan Law School (4)
- Vanderbilt University Law School (4)
- Mitchell Hamline School of Law (3)
- New York Law School (3)
- Northwestern Pritzker School of Law (3)
- The Catholic University of America, Columbus School of Law (3)
- University of New Hampshire (3)
- University of Pittsburgh School of Law (3)
- Washington University in St. Louis (3)
- American University Washington College of Law (2)
- Chicago-Kent College of Law (2)
- Golden Gate University School of Law (2)
- Southern Methodist University (2)
- University of Colorado Law School (2)
- University of Florida Levin College of Law (2)
- University of Georgia School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- BLR (1)
- Butler University (1)
- DePaul University (1)
- Publication Year
- Publication
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (23)
- Georgetown Law Faculty Publications and Other Works (15)
- Faculty Scholarship (12)
- Scholarship Chronologically (7)
- All Faculty Scholarship (6)
-
- Canadian Journal of Law and Technology (5)
- Catholic University Journal of Law and Technology (3)
- Journal Articles (3)
- Marquette Intellectual Property & Innovation Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Northwestern Journal of Technology and Intellectual Property (3)
- Scholarship@WashULaw (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Articles (2)
- Articles & Chapters (2)
- Articles by Maurer Faculty (2)
- Book Chapters (2)
- Cybaris® (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- IP Theory (2)
- Jonathan I. Ezor (2)
- Katharine Van Tassel (2)
- Law Faculty Scholarship (2)
- Pace Intellectual Property, Sports & Entertainment Law Forum (2)
- Publications (2)
- UF Law Faculty Publications (2)
- Akron Law Faculty Publications (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Chicago-Kent Journal of Intellectual Property (1)
- Chicago-Kent Law Review (1)
- Publication Type
Articles 1 - 30 of 168
Full-Text Articles in Law
Facing Up To The Risks Of Automated Facial-Recognition Technologies In Indian Law Enforcement, Ameen Jauhar
Facing Up To The Risks Of Automated Facial-Recognition Technologies In Indian Law Enforcement, Ameen Jauhar
Indian Journal of Law and Technology
Within the larger discourse of risk mitigation of emerging technologies, the ever-expanding deployment of automated facial recognition technology (‘AFRT’) has garnered much skepticism. In India too, there has been a reported rise of states and law enforcement officials enthusiastically resorting to the use of AFRT.
The author will first delve into some of the controversial risks associated with AFRT, analysing them through the lens of Article 21 and the principle of due process under the Indian Constitution. The paper will then identify some of the regulatory solutions that are currently part of the discourse on minimising risks of AFRT and …
The President’S Foreign Affairs Power Over Personal Data, Anupam Chander, Paul M. Schwartz
The President’S Foreign Affairs Power Over Personal Data, Anupam Chander, Paul M. Schwartz
Georgetown Law Faculty Publications and Other Works
This Article reveals a surprising expansion of presidential authority to control goods and services available in the United States because of the information flows that they entail. Such authority is grounded in laws focused on protecting national security, here with respect to foreign surveillance and propaganda. But broad executive powers over our information infrastructure raises significant concerns with respect to core American values of free expression and due process. Worries about unfettered foreign access to data should be coupled with worries about unfettered executive control over our information services and technologies.
Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi
Cybaris®
No abstract provided.
The Trade Origins Of Privacy Law, Anupam Chander
The Trade Origins Of Privacy Law, Anupam Chander
Georgetown Law Faculty Publications and Other Works
The desire for trade propelled the growth of data privacy law across the world. Countries with strong privacy laws sought to ensure that their citizens’ privacy would not be compromised when their data traveled to other countries. Even before this vaunted Brussels Effect pushed privacy law across the world through the enticement of trade with the European Union, Brussels had to erect privacy law within the Union itself. And as the Union itself expanded, privacy law was a critical condition for accession.
But this coupling of privacy and trade leaves a puzzle: how did the U.S. avoid a comprehensive privacy …
Unavoidability In U.S. Privacy Law, Laura M. Moy
Unavoidability In U.S. Privacy Law, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Why is U.S. privacy law structured the way it is, with a series of sectoral laws rather than a cross-sectoral law or laws? Why does U.S. privacy law protect information shared in certain contexts—such as information shared with an attorney, a healthcare provider, or a financial provider—rather than particular types of information? One possibility is that sectoral laws apply to contexts in which people typically share highly “sensitive” information containing intimate secrets or with the potential to harm them financially or psychologically.
But this Article argues that there is something else at play—that in fact, an under-discussed and underappreciated factor …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
Direct To Consumer Or Direct To All: Home Dna Tests And Lack Of Privacy Regulations In The United States, Karen J. Kukla
IP Theory
Although the U.S. has some measures of privacy protection for genetic data, the lack of a comprehensive approach to protecting direct-to-consumer genetic testing results in privacy violations for both consumers and their relatives. This essay explores the critical need for the U.S. government to address these privacy violations and argues that the U.S. should approach the problem and strategize a solution similar to the European Union’s (EU) General Data Protection Regulation (GDPR). Part I identifies current United States law, both federal and state regulations that address DTC-GT and genetic privacy. Part II examines the lack of regulation surrounding current DTC-GT …
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
Encouraging Public Access To Pharmaceuticals Through Modified Protection Of Clinical Trial Data, Scott M. Nolan Ii
IP Theory
Part I of this Article investigates the development of pharmaceuticals and clinical trial data with a focus on patent and data protection. Part II evaluates the effects of protection and the challenges it poses to widespread public pharmaceutical access. Part III discusses two scholarly approaches to the public access issue that focus on clinical data protection and their associated challenges. In light of these scholarly works, Part IV suggests a new approach to clinical trial data protection that aims to improve public pharmaceutical access while maintaining the incentives to invent for drug developers.
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
Vanderbilt Journal of Entertainment & Technology Law
A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …
Securing Patent Law, Charles Duan
Securing Patent Law, Charles Duan
Articles in Law Reviews & Other Academic Journals
A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …
Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey
Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey
Marquette Intellectual Property & Innovation Law Review
None
Grand Jury Information And Government Contractors: Reconciliation Through Privacy Law, Andrew Holzmann
Grand Jury Information And Government Contractors: Reconciliation Through Privacy Law, Andrew Holzmann
Marquette Intellectual Property & Innovation Law Review
None
International Tax Agreements As The Final Push For Us Adoption Of Adequate Protection In Connection With The Gdpr, Olivia Hansen
International Tax Agreements As The Final Push For Us Adoption Of Adequate Protection In Connection With The Gdpr, Olivia Hansen
Marquette Intellectual Property & Innovation Law Review
None
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Inadequate Privacy: The Necessity Of Hipaa Reform In A Post-Dobbs World, Katherine Robertson
Seattle University Law Review
Part I of this Comment will provide an overview of HIPAA and the legal impacts of Dobbs. Part II will discuss the anticipatory response to the impacts of Dobbs on PHI by addressing the response from (1) the states, (2) the Biden Administration, and (3) the medical field. Part III will discuss the loopholes that exist in HIPAA and further address the potential impacts on individuals and the medical field if reform does not occur. Finally, Part IV will argue that the reform of HIPAA is the best avenue for protecting PHI related to reproductive healthcare.
Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey
Questions Of Intellectual Property And Fundamental Values In The Digital Age, Jessica Silbey
Faculty Scholarship
Today's intellectual property debates, in both law and the larger society, are a bellwether of changing justice needs in the twenty-first century. As the digital age democratizes technological opportunities, it brings intellectual property law into mainstream everyday culture. This generates debates about the relationship between the constitutional interest in "the progress of science and useful arts" and other fundamental values, such as equality, privacy, and distributive justice. These values, which were not explicitly part of intellectual property regimes in prior eras, are especially challenged in today's internet world.
The article (which was presented as the annual Nies Lecture in April …
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …
Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide
Delineating The Legal Framework For Data Protection: A Fundamental Rights Approach Or Data Propertization?, Efe Lawrence Ogbeide
Canadian Journal of Law and Technology
The Charter of Fundamental Rights of the European Union, like other key legal instruments around the globe, grants citizens the right to privacy in Article 7. The Charter, however, further provides for the right to data protection in Article 8. Simply put, the implication of Article 8 of the Charter is that the right to data protection is a fundamental right. The central question in this article is whether data protection indeed qualifies to be categorized as a fundamental right. If not, what other approach(es) to data protection may be implemented?
Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman
Navigating The Identity Thicket: Trademark's Lost Theory Of Personality, The Right Of Publicity, And Preemption, Jennifer E. Rothman
All Faculty Scholarship
Both trademark and unfair competition laws and state right of publicity laws protect against unauthorized uses of a person’s identity. Increasingly, however, these rights are working at odds with one another, and can point in different directions with regard to who controls a person’s name, likeness, and broader indicia of identity. This creates what I call an "identity thicket" of overlapping and conflicting rights over a person’s identity. Current jurisprudence provides little to no guidance on the most basic questions surrounding this thicket, such as what right to use a person’s identity, if any, flows from the transfer of marks …
Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu
Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu
Fellow, Adjunct, Lecturer, and Research Scholar Works
Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …
Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy
Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Does law enforcement use of face recognition technology paired with eyewitness identifications increase the incidence of wrongful convictions in U.S. criminal law? This Article explores this critical question and posits that the answer may be yes. Facial recognition is frequently used by law enforcement agencies to help generate investigative leads that are then presented to eyewitnesses for positive identification. But erroneous eyewitness accounts are the number one cause of wrongful convictions, and the use of face recognition to generate investigative leads may create the conditions for erroneous eyewitness identifications to take place. This is because face recognition technology is designed …
Contested Sovereignties: States, Media Platforms, Peoples, And The Regulation Of Media Content And Big Data In The Networked Society, Pascale Chapdelaine, Jaqueline Mcleod Rogers
Contested Sovereignties: States, Media Platforms, Peoples, And The Regulation Of Media Content And Big Data In The Networked Society, Pascale Chapdelaine, Jaqueline Mcleod Rogers
Law Publications
This article examines the legal and normative foundations of media content regulation in the borderless networked society. We explore the extent to which internet undertakings should be subject to state regulation, in light of Canada’s ongoing debates and legislative reform. We bring a cross-disciplinary perspective (from the subject fields of law; communications studies, in particular McLuhan’s now classic probes; international relations; and technology studies) to enable both policy and language analysis. We apply the concept of sovereignty to states (national cultural and digital sovereignty), media platforms (transnational sovereignty), and citizens (autonomy and personal data sovereignty) to examine the competing dynamics …
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Indiana Law Journal
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way …
Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu
Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu
Georgetown Law Faculty Publications and Other Works
Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the “privacy enforcement gap”—the disparity between the …
The Norms Of Algorithmic Credit Scoring, Nikita Aggarwal
The Norms Of Algorithmic Credit Scoring, Nikita Aggarwal
Articles
This article examines the growth of algorithmic credit scoring and its implications for the regulation of consumer credit markets in the UK. It constructs a frame of analysis for the regulation of algorithmic credit scoring, bound by the core norms underpinning UK consumer credit and data protection regulation: allocative efficiency, distributional fairness and consumer privacy (as autonomy). Examining the normative trade-offs that arise within this frame, the article argues that existing data protection and consumer credit frameworks do not achieve an appropriate normative balance in the regulation of algorithmic credit scoring. In particular, the growing reliance on consumers' personal data …
Legal Opacity: Artificial Intelligence’S Sticky Wicket, Charlotte A. Tschider
Legal Opacity: Artificial Intelligence’S Sticky Wicket, Charlotte A. Tschider
Faculty Publications & Other Works
Proponents of artificial intelligence (“AI”) transparency have carefully illustrated the many ways in which transparency may be beneficial to prevent safety and unfairness issues, to promote innovation, and to effectively provide recovery or support due process in lawsuits. However, impediments to transparency goals, described as opacity, or the “black-box” nature of AI, present significant issues for promoting these goals.
An undertheorized perspective on opacity is legal opacity, where competitive, and often discretionary legal choices, coupled with regulatory barriers create opacity. Although legal opacity does not specifically affect AI only, the combination of technical opacity in AI systems with legal opacity …
Data As The New Oil: A Slippery Slope Of Trade Secret Implications Greased By The California Consumer Privacy Act, Megan Marie Miller
Data As The New Oil: A Slippery Slope Of Trade Secret Implications Greased By The California Consumer Privacy Act, Megan Marie Miller
Cybaris®
Following the European model of the General Data Protection Regulation (GDPR), the state of California implemented the California Consumer Privacy Act (CCPA) on January 1, 2020. The CCPA allows any California consumer to demand to see all of the information that a company has saved on them; consumers can also request a full list of all the third parties that their data is shared with, sold to, and for what commercial purpose. This paper reviews the implications of a new law on the disclosure of trade secrets like client lists and algorithms that manipulate consumers’ data. Ultimately, the issue comes …
From Lex Informatica To The Control Revolution, Julie E. Cohen
From Lex Informatica To The Control Revolution, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …