Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy Dec 2021

Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Does law enforcement use of face recognition technology paired with eyewitness identifications increase the incidence of wrongful convictions in U.S. criminal law? This Article explores this critical question and posits that the answer may be yes. Facial recognition is frequently used by law enforcement agencies to help generate investigative leads that are then presented to eyewitnesses for positive identification. But erroneous eyewitness accounts are the number one cause of wrongful convictions, and the use of face recognition to generate investigative leads may create the conditions for erroneous eyewitness identifications to take place. This is because face recognition technology is designed …


Digital Health Passes In The Age Of Covid-19: Are “Vaccine Passports” Lawful And Ethical?, Lawrence O. Gostin, I. Glenn Cohen, Jana Shaw Apr 2021

Digital Health Passes In The Age Of Covid-19: Are “Vaccine Passports” Lawful And Ethical?, Lawrence O. Gostin, I. Glenn Cohen, Jana Shaw

Georgetown Law Faculty Publications and Other Works

As COVID-19 vaccination rates in high-income countries increase, governments are proposing or implementing digital health passes (DHPs) (vaccine “passports” or “certificates”). Israel uses a “green pass” smartphone application permitting vaccinated individuals’ access to public venues (eg, gyms, hotels, entertainment). The European Union plans a “Digital Green Certificate” enabling free travel within the bloc (see eTable in the Supplement). New York is piloting an IBM “Excelsior Pass,” confirming vaccination or negative SARS-CoV-2 test status through confidential data transfers to fast-track business reopenings. This paper examines the benefits of DHPs, scientific challenges, and whether they are lawful and ethical.


Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu Mar 2021

Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu

Georgetown Law Faculty Publications and Other Works

Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the “privacy enforcement gap”—the disparity between the …


Sovereignty 2.0, Anupam Chander, Haochen Sun Jan 2021

Sovereignty 2.0, Anupam Chander, Haochen Sun

Georgetown Law Faculty Publications and Other Works

Digital sovereignty—the exercise of control over the internet—is the ambition of the world’s leaders, from Australia to Zimbabwe, a bulwark against both foreign state and foreign corporation. Governments have resoundingly answered first-generation internet law questions of who if anyone should regulate the internet—they all will. We now confront second generation questions—not whether, but how to regulate the internet. We argue that digital sovereignty is simultaneously a necessary incident of democratic governance and democracy’s dreaded antagonist. As international law scholar Louis Henkin taught us, sovereignty can insulate a government’s worst ills from foreign intrusion. Assertions of digital sovereignty, in particular, …


Could Private Legislation Be The First Key To Unlocking The Nation’S Information Resources In The Battle Against Misinformation?, Michelle M. Wu Jan 2021

Could Private Legislation Be The First Key To Unlocking The Nation’S Information Resources In The Battle Against Misinformation?, Michelle M. Wu

Georgetown Law Faculty Publications and Other Works

Unfiltered, unverified information flows freely on the web and is much more easily found and used than reliable sources. There are logical reasons for this, as quality, reliable information often costs both time and money to investigate, verify, and publish. However, that type of investment only justifies the charging for the information at the outset, not the cabining of it once it is available and has been purchased. Where public libraries have acquired content, they should be allowed to maximize its use in society within the bounds of copyright. Such use is within the spirit of copyright and its hope …


Trademarks As Surveillance Transparency, Amanda Levendowski Jan 2021

Trademarks As Surveillance Transparency, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

We know very little about the technologies that watch us. From cell site simulators to predictive policing algorithms, the lack of transparency around surveillance technologies makes it difficult for the public to engage in meaningful oversight. Legal scholars have critiqued various corporate and law enforcement justifications for surveillance opacity, including contract and intellectual property law. But the public needs a free, public, and easily accessible source of information about corporate technologies that might be used to watch us. To date, the literature has overlooked a free, extensive, and easily accessible source of information about surveillance technologies hidden in plain sight: …


A Taxonomy Of Police Technology’S Racial Inequity Problems, Laura M. Moy Jan 2021

A Taxonomy Of Police Technology’S Racial Inequity Problems, Laura M. Moy

Georgetown Law Faculty Publications and Other Works

Over the past several years, increased awareness of racial inequity in policing, combined with increased scrutiny of police technologies, have sparked concerns that new technologies may aggravate inequity in policing. To help address these concerns, some advocates and scholars have proposed requiring police agencies to seek and obtain legislative approval before adopting a new technology, or requiring the completion of “algorithmic impact assessments” to evaluate new tools.

In order for policymakers, police agencies, or scholars to evaluate whether and how particular technologies may aggravate existing inequities, however, the problem must be more clearly defined. Some scholars have explored inequity in …


The Corruption Of Copyright And Returning It To Its Original Purposes, Michelle M. Wu Jan 2021

The Corruption Of Copyright And Returning It To Its Original Purposes, Michelle M. Wu

Georgetown Law Faculty Publications and Other Works

Since its inception, Copyright has had two purposes: the private interest of the author in being paid for her work and the public interest served by the dissemination of these works. Within the last two decades, though, some industries have systematically undermined both of those interests, redirecting the benefits of copyright towards themselves instead of the intended beneficiaries. This paper looks at the book, music, and entertainment industries, examines how copyright has been used to suppress the uses it was intended to foster, and explores ongoing and proposed avenues for course correction.


Storming Zuckerberg’S Castle, Anupam Chander Jan 2021

Storming Zuckerberg’S Castle, Anupam Chander

Georgetown Law Faculty Publications and Other Works

A company’s server is its castle, Richard Epstein once declared. Because of this, anyone sending an email to that server needs permission to enter. Within its own logic, this seems incontrovertible, but it depends on a few logical steps worth unpacking. It begins with the premise that a man’s home is his castle. (The masculine pronoun in the early formulation seems relevant.) Let us accept that premise for the purpose of argument. Combining this premise with the investiture of legal personhood on a corporation, we might then deduce that a company’s home must be its castle. Finally, combining that …


From Lex Informatica To The Control Revolution, Julie E. Cohen Jan 2021

From Lex Informatica To The Control Revolution, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …


Restoring The Balance Of Copyright: Antitrust, Misuse, And Other Possible Paths To Challenge Inequitable Licensing Practices, Michelle M. Wu Jan 2021

Restoring The Balance Of Copyright: Antitrust, Misuse, And Other Possible Paths To Challenge Inequitable Licensing Practices, Michelle M. Wu

Georgetown Law Faculty Publications and Other Works

Libraries’ purposes of ensuring access to and preservation of information have been compromised as licensing increasingly replaces ownership. This article outlines various novel legal strategies that libraries could use to restore copyright’s intended balance, including antitrust, preemption, misuse, and unconscionability.