Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 65

Full-Text Articles in Law

The Wild, Wild West Of Laboratory Developed Tests, John Gilmore Mar 2024

The Wild, Wild West Of Laboratory Developed Tests, John Gilmore

Washington and Lee Law Review Online

Since the 1950’s, scientists have built novel technologies to screen for genetic diseases and other biological irregularities. Recently, researchers have developed a method called “liquid biopsy” (as opposed to a standard tissue biopsy) that uses a liquid sample (e.g., blood) to non‑invasively spot biomarkers indicating different types of cancers in the patient’s body. While the U.S. Food and Drug Administration (FDA) has fully cleared a small number of liquid biopsy tests under its rigorous and expensive review process, most biotech companies have instead followed a less restrictive regulatory path through the Centers for Medicare and Medicaid Services (CMS), which label …


Artificial Intelligence And Transformative Use After Warhol, Gary Myers Dec 2023

Artificial Intelligence And Transformative Use After Warhol, Gary Myers

Washington and Lee Law Review Online

The Supreme Court’s recent decision in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith clarifies the scope of transformative use and the role of these uses in the fair use analysis. This important case has implications for a fair use analysis of artificial intelligence. This article evaluates the interaction between copyright law’s fair use doctrine and typical sources and uses for artificial intelligence. In other words, the article will assess whether or not the use of copyrighted material to “train” AI programs—AI inputs—and the products of AI programs—AI outputs—are likely to found to be transformative in light of …


Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle Dec 2023

Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle

Washington and Lee Law Review Online

In an era dominated by efficiency-driven technology, algorithms have seamlessly integrated into every facet of daily life, wielding significant influence over decisions that impact individuals and society at large. Algorithms are deliberately portrayed as impartial and automated in order to maintain their legitimacy. However, this illusion crumbles under scrutiny, revealing the inherent biases and discriminatory tendencies embedded in ostensibly unbiased algorithms. This Note delves into the pervasive issues of discriminatory algorithms, focusing on three key areas of life opportunities: housing, employment, and voting rights. This Note systematically addresses the multifaceted issues arising from discriminatory algorithms, showcasing real-world instances of algorithmic …


Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger Oct 2023

Stay Out Of My Head: Neurodata, Privacy, And The First Amendment, Wayne Unger

Washington and Lee Law Review

The once science-fictional idea of mind-reading is within reach as advancements in brain-computer interfaces, coupled with advanced artificial intelligence, produce neurodata—the collection of substantive thoughts as storable and processable data. But government access to individuals’ neurodata threatens personal autonomy and the right to privacy. While the Fourth Amendment is traditionally considered the source of privacy protections against government intrusion, the First Amendment provides more robust protections with respect to whether governments can access one’s substantive ideas, thoughts, and beliefs. However, many theorists assert that the concept of privacy conflicts with the First Amendment because privacy restricts the flow of information …


Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai Jul 2023

Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai

Washington and Lee Law Review

Tantamount with the increasing application of blockchain technologies around the world, the use of blockchain-based smart contracts has rapidly risen. In a “smart contract,” computer protocols automatically facilitate, verify, and enforce arrangements made between parties on a blockchain. Such smart contracts offer a variety of commercial benefits, notably immutability and increased efficiency facilitated by removing the need for a trusted intermediary. However, as discussed in recent legal scholarship, it is difficult for smart contracts to uphold certain fundamental principles of contract law. Translating concepts of individual intention and responsibility into the decentralized space of blockchain is problematic. Aggregating such individual …


Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim Jul 2023

Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim

Washington and Lee Law Review

FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …


The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire Jul 2023

The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire

Washington and Lee Law Review

Global connectivity is at an all-time high, and sovereign state law has not fully caught up with the technological innovations enabling that connectivity. TCP/IP—the communications protocol allowing computers on different networks to speak with each other—wasn’t adopted by ARPANET and the Defense Data Network until January 1983. That’s only forty years ago. And the World Wide Web wasn’t released to the general public until August 1991, less than thirty-five years ago. The first Bitcoin block was mined on January 3, 2009, less than fifteen years ago.

Legal doctrine doesn’t develop that fast, especially in legal systems heavily based around judicial …


Keynote Address, Sultan Meghji Jul 2023

Keynote Address, Sultan Meghji

Washington and Lee Law Review

Keynote address presented virtually at the Washington and Lee Law Review's 54th Annual Lara D. Gass Symposium: The Future of E-Commerce: Is It on a Blockchain? on Friday, March 17, 2023 in Lexington, Virginia.


Digital Property Cycles, Joshua Fairfield Jul 2023

Digital Property Cycles, Joshua Fairfield

Washington and Lee Law Review

The present downturn in non-fungible token (“NFT”) markets is no cause for immediate alarm. There have been multiple cycles in both the legal and media focus on digital intangible property, and these cycles will recur. The cycles are easily explainable: demand for intangible property is constant, even increasing. The legal regimes governing ownership of these assets are unstable and poorly suited to satisfying the preferences of buyers and sellers. The combination of demand and poor legal regulation gives rise to the climate of fraud that has come to characterize NFTs, but it has nothing to do with the value of …


How The Blockchain Undermined Digital Ownership, Aaron Perzanowski Jul 2023

How The Blockchain Undermined Digital Ownership, Aaron Perzanowski

Washington and Lee Law Review

The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …


The Perks Of Being Human, Max Stul Oppenheimer Apr 2023

The Perks Of Being Human, Max Stul Oppenheimer

Washington and Lee Law Review Online

The power of artificial intelligence has recently entered the public consciousness, prompting debates over numerous legal issues raised by use of the tool. Among the questions that need to be resolved is whether to grant intellectual property rights to copyrightable works or patentable inventions created by a machine, where there is no human intervention sufficient to grant those rights to the human. Both the U. S. Copyright Office and the U. S. Patent and Trademark Office have taken the position that in cases where there is no human author or inventor, there is no right to copyright or patent protection. …


Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency Apr 2023

Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency

Washington and Lee Journal of Civil Rights and Social Justice

Companies have too much control over people’s information. In the data marketplace, companies package and sell individuals’ data, and these individuals have little to no bargaining power over the process. Companies may freely buy and sell people’s data in the private sector for targeted marketing and behavior manipulation. In the justice system, an unchecked data marketplace leaves black and brown communities vulnerable to serious data access issues caused by predictive sentencing, for example. Risk assessment algorithms in predictive sentencing rely on data on individuals and run all relevant data points to provide the likelihood that a defendant will recidivate low …


Exams In The Time Of Chatgpt, Margaret Ryznar Mar 2023

Exams In The Time Of Chatgpt, Margaret Ryznar

Washington and Lee Law Review Online

Invaluable guidance has emerged regarding online teaching in recent years, but less so concerning online and take-home final exams. This article offers various methods to administer such exams while maintaining their integrity—after asking artificial intelligence writing tool ChatGPT for its views on the matter. The sophisticated response of the chatbot, which students can use in their written work, only raises the stakes of figuring out how to administer exams fairly.


Risk Assessment And Immigration Court, Richard Frankel Jan 2023

Risk Assessment And Immigration Court, Richard Frankel

Washington and Lee Law Review

Risk assessment and algorithmic tools have become increasingly popular in recent years, particularly with respect to detention and incarceration decisions. The emergence of big data and the increased sophistication of algorithmic design hold the promise of more accurately predicting whether an individual is dangerous or a flight risk, overcoming human bias in decision-making, and reducing detention without compromising public safety. But these tools also carry the potential to exacerbate racial disparities in incarceration, create a false veneer of objective scientific accuracy, and spawn opaque decision-making by “black box” computer programs.

While scholars have focused much attention on how judges in …


High Time For Change: The Legalization Of Marijuana And Its Impact On Warrantless Roadside Motor Vehicle Searches, Molly E. O'Connell Oct 2022

High Time For Change: The Legalization Of Marijuana And Its Impact On Warrantless Roadside Motor Vehicle Searches, Molly E. O'Connell

Washington and Lee Law Review Online

The proliferation of marijuana legalization has changed the relationship between driving and marijuana use. While impaired driving remains illegal, marijuana use that does not result in impairment is not a bar to operating a motor vehicle. Scientists have yet to find a reliable way for law enforcement officers to make this distinction. In the marijuana impairment context, there is not a scientifically proven equivalent to the Blood Alcohol Content standard nor are there reliable roadside assessments. This scientific and technological void has problematic consequences for marijuana users that get behind the wheel and find themselves suspected of impaired driving. Without …


Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


The New State Of Surveillance: Societies Of Subjugation, Khaled Ali Beydoun Apr 2022

The New State Of Surveillance: Societies Of Subjugation, Khaled Ali Beydoun

Washington and Lee Law Review

Foundational surveillance studies theory has largely been shaped in line with the experiences of white subjects in western capitalist societies. Formative scholars, most notably Michel Foucault and Gilles Deleuze, theorized that the advancement of surveillance technology tempers the State’s reliance on mass discipline and corporal punishment. Legal scholarship examining modern surveillance perpetuates this view, and popular interventions, such as the blockbuster docudrama The Social Dilemma and Shoshana Zuboff’s bestseller The Age of Surveillance Capitalism, mainstream the myth of colorblind surveillance. However, the experiences of nonwhite subjects of surveillance—pushed to or beyond the margins of these formative discourses—reflect otherwise. …


The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict Apr 2022

The Computer Got It Wrong: Facial Recognition Technology And Establishing Probable Cause To Arrest, T.J. Benedict

Washington and Lee Law Review

Facial recognition technology (FRT) is a popular tool among police, who use it to identify suspects using photographs or still-images from videos. The technology is far from perfect. Recent studies highlight that many FRT systems are less effective at identifying people of color, women, older people, and children. These race, gender, and age biases arise because FRT is often “trained” using non-diverse faces. As a result, police have wrongfully arrested Black men based on mistaken FRT identifications. This Note explores the intersection of facial recognition technology and probable cause to arrest.

Courts rarely, if ever, examine FRT’s role in establishing …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


The Golem In The Machine: Ferpa, Dirty Data, And Digital Distortion In The Education Record, Najarian R. Peters Jan 2022

The Golem In The Machine: Ferpa, Dirty Data, And Digital Distortion In The Education Record, Najarian R. Peters

Washington and Lee Law Review

Like its counterpart in the criminal justice system, dirty data—data that is inaccurate, incomplete, or misleading—in K-12 education records creates and catalyzes catastrophic life events. The presence of this data in any record suggests a lack of data integrity. The systemic problem of dirty data in education records means the data stewards of those records have failed to meet the data integrity requirements embedded in the Family Educational Rights and Privacy Act (FERPA). FERPA was designed to protect students and their education records from the negative impact of erroneous information rendered from the “private scribblings” of educators. The legislative history …


Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon Jan 2022

Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon

Washington and Lee Law Review

In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.

This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …


Past The Tipping Point, But With Hope Of Return: How Creating A Geoengineering Compulsory Licensing Scheme Can Incentivize Innovation, Brooke Wilson Apr 2021

Past The Tipping Point, But With Hope Of Return: How Creating A Geoengineering Compulsory Licensing Scheme Can Incentivize Innovation, Brooke Wilson

Washington and Lee Journal of Civil Rights and Social Justice

This Note explores the patenting of geoengineering technologies and issues arising from the early stages of this high-risk, high-reward technology. This Note focuses on one possible solution to solving the issues surrounding the patenting of geoengineering technology: Creating a specialized compulsory licensing scheme.


Technological Tethereds: Potential Impact Of Untrustworthy Artificial Intelligence In Criminal Justice Risk Assessment Instruments, Sonia M. Gipson Rankin Apr 2021

Technological Tethereds: Potential Impact Of Untrustworthy Artificial Intelligence In Criminal Justice Risk Assessment Instruments, Sonia M. Gipson Rankin

Washington and Lee Law Review

Issues of racial inequality and violence are front and center today, as are issues surrounding artificial intelligence (“AI”). This Article, written by a law professor who is also a computer scientist, takes a deep dive into understanding how and why hacked and rogue AI creates unlawful and unfair outcomes, particularly for persons of color.

Black Americans are disproportionally featured in criminal justice, and their stories are obfuscated. The seemingly endless back-to-back murders of George Floyd, Breonna Taylor, Ahmaud Arbery, and heartbreakingly countless others have finally shaken the United States from its slumbering journey towards intentional criminal justice reform. Myths about …


A Tale Of Two Regulators: Antitrust Implications Of Progressive Decentralization In Blockchain Platforms, Evan Miller Mar 2021

A Tale Of Two Regulators: Antitrust Implications Of Progressive Decentralization In Blockchain Platforms, Evan Miller

Washington and Lee Law Review Online

Competition regulators have identified the potential for blockchain technology to disrupt traditional sponsor-led platforms, like app stores, that have received increased antitrust scrutiny. Enforcement actions by securities regulators, however, have forced blockchain-based platforms to adopt a strategy of progressive decentralization, delaying decentralization objectives in favor of the centralized model that competition regulators hope they will disrupt. This regulatory tension, and the implications for blockchain’s procompetitive potential, have yet to be explored. This Article first identifies the origin of this tension and its consequences through a competition law lens, and then recommends that competition regulators account for this tension in monitoring …


Unifying Antitrust Enforcement For The Digital Age, John O. Mcginnis, Linda Sun Jan 2021

Unifying Antitrust Enforcement For The Digital Age, John O. Mcginnis, Linda Sun

Washington and Lee Law Review

As the digital revolution continues to transform competition among businesses, U.S. antitrust enforcement has struggled to remain effective. The U.S. has long depended on a system of dual antitrust enforcement through both the Federal Trade Commission (FTC) and the Department of Justice (DOJ). Modern technology has greatly exacerbated existing structural deficiencies of the two-headed approach, at times resulting in deadlock. The two agencies approach new antitrust issues generated by computational technologies differently and fight over who should lead key investigations, leading to economic uncertainty in the most important business sectors. These enforcement disagreements can also hobble the government’s response to …


The Digital Samaritans, Eldar Haber Oct 2020

The Digital Samaritans, Eldar Haber

Washington and Lee Law Review

Bystanderism is becoming largely digital. If being subjected to perilous situations was once reserved almost solely for the physical world, individuals now might witness those in peril digitally from afar via online livestreams. New technological developments in the field of artificial intelligence (AI) might also expand bystanderism to new fields, whereby machines—not just humans—are gradually positioned to better compute their surroundings, thus potentially being capable of reaching a high statistical probability that a perilous situation is currently taking place in their vicinity. This current and future expansion of bystanderism into the digital world forms a rather new type of digital …


Technology’S Influence On Federal Sentencing: Past, Present, And Future, Matthew G. Rowland May 2020

Technology’S Influence On Federal Sentencing: Past, Present, And Future, Matthew G. Rowland

Washington and Lee Journal of Civil Rights and Social Justice

The comprehensive reforms that govern today’s federal sentencing processes were fashioned nearly forty years ago. Those reforms were designed to address concerns regarding the effectiveness, transparency, and fairness of the preexisting indeterminant sentencing system. Today, criticisms are mounting against the very reforms that were once held out to save the sentencing process. The more determinant system is being accused of being biased against minorities, overly harsh, and costly.

This Article explores how the criminal justice system might look to technology and build on the practical experience from the indeterminant and determinant systems. Tools such as Artificial Intelligence (AI) can help …


Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon Apr 2020

Limited Privacy In “Pings:” Why Law Enforcement’S Use Of Cell-Site Simulators Does Not Categorically Violate The Fourth Amendment, Lara M. Mcmahon

Washington and Lee Law Review

This Note proposes four factors courts should consider when asked to determine whether law enforcement’s use of a cell-site simulator constituted a Fourth Amendment search. The first asks courts to consider whether the cell-site simulator surveillance infringed on a constitutionally protected area, such as the home. The second asks courts to consider the duration of the cell-site simulator surveillance. The third asks courts to consider whether the cell-site simulator surveillance was conducted actively or passively. The fourth asks courts to focus on the nature and depth of the information obtained as a result of the cell-site simulator surveillance. If, after …


Secret Conviction Programs, Meghan J. Ryan Mar 2020

Secret Conviction Programs, Meghan J. Ryan

Washington and Lee Law Review

Judges and juries across the country are convicting criminal defendants based on secret evidence. Although defendants have sought access to the details of this evidence—the results of computer programs and their underlying algorithms and source codes—judges have generally denied their requests. Instead, judges have prioritized the business interests of the for-profit companies that developed these “conviction programs” and which could lose market share if the secret algorithms and source codes on which the programs are based were exposed. This decision has jeopardized criminal defendants’ constitutional rights.


Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek Mar 2020

Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek

Washington and Lee Law Review

This Note received the 2019 Roy L. Steinheimer Law Review Award.

This Note argues that the Racketeer Influenced and Corrupt Organizations Act (RICO) may be suited to cryptocurrency prosecutions. RICO subsection 1962(a) addresses the infiltration of an enterprise by investing proceeds from racketeering activities and this Note contends that a cryptocurrency network could serve as the “enterprise” required by the statute. Instead of having to investigate and prove the relationships in an underlying criminal enterprise, proponents of a RICO case against crypto-criminals could rely on well-documented and publicly available information about the cryptocurrency network to prove the enterprise and the …