Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Northwestern Pritzker School of Law (109)
- University of Michigan Law School (45)
- American University Washington College of Law (17)
- Selected Works (16)
- Boston University School of Law (12)
-
- Fordham Law School (12)
- University of Pennsylvania Carey Law School (12)
- Vanderbilt University Law School (10)
- New York Law School (9)
- Marquette University Law School (8)
- University of Miami Law School (7)
- Georgetown University Law Center (6)
- Chicago-Kent College of Law (5)
- Maurer School of Law: Indiana University (5)
- Pepperdine University (5)
- The Catholic University of America, Columbus School of Law (5)
- The University of Akron (5)
- University of Baltimore Law (5)
- University of Massachusetts School of Law (5)
- University of Richmond (5)
- BLR (4)
- Duke Law (4)
- Touro University Jacob D. Fuchsberg Law Center (4)
- University of Washington School of Law (4)
- Seattle University School of Law (3)
- SelectedWorks (3)
- Yeshiva University, Cardozo School of Law (3)
- Columbia Law School (2)
- Emory University School of Law (2)
- Georgia State University College of Law (2)
- Publication Year
- Publication
-
- Northwestern Journal of Technology and Intellectual Property (108)
- Michigan Telecommunications & Technology Law Review (26)
- All Faculty Scholarship (20)
- Faculty Scholarship (19)
- Articles (17)
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (11)
- Articles in Law Reviews & Other Academic Journals (9)
- Marquette Intellectual Property Law Review (7)
- Georgetown Law Faculty Publications and Other Works (6)
- Amicus Briefs (5)
- Vanderbilt Journal of Transnational Law (5)
- Akron Law Review (4)
- Articles & Chapters (4)
- ExpressO (4)
- Faculty Publications (4)
- Law Faculty Publications (4)
- Michigan Journal of International Law (4)
- Other Publications (4)
- Pepperdine Law Review (4)
- Touro Law Review (4)
- Catholic University Journal of Law and Technology (3)
- Edward Lee (3)
- Faculty Articles (3)
- NYLS Law Review (3)
- Seattle University Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- American University Law Review (2)
- Articles by Maurer Faculty (2)
- Catholic University Law Review (2)
- Georgia State University Law Review (2)
Articles 1 - 30 of 369
Full-Text Articles in Law
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Downstreaming, Rachel Landy
Downstreaming, Rachel Landy
Articles
Spotify and its competitors all offer the same product at the same price. Why? Scholars have argued that relationships can be designed in a way that naturally promotes innovation. By “braiding” certain formal contracting practices with informal enforcement norms, parties develop a frame-work that supports trust and positive, long-term collaboration. This Article takes on this consensus and shows that not all braiding is good. Using the multibillion-dollar subscription music streaming business as an illustration, it demonstrates just how industry forces can, and do, overcome braiding’s positive slant. In that industry, the major record labels (Universal, Warner, and Sony) weaponize braiding …
Open Source Perfume, Amanda Levendowski
Open Source Perfume, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Articles
In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Security In The Digital Age, Michael Gentithes
Security In The Digital Age, Michael Gentithes
Akron Law Review
Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …
Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson
Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson
Dickinson Law Review (2017-Present)
In this Essay, we analyze the arguments in favor of, and against, viewing the use of copyrighted works in training sets for AI as fair use. We call this form of fair use “fair training.” We identify both strong and spurious arguments on both sides of this debate. In addition, we attempt to take a broader perspective, weighing the societal costs (e.g., replacement of certain forms of human employment) and benefits (e.g., the possibility of novel AI-based approaches to global issues such as environmental disruption) of allowing AI to make easy use of copyrighted works as training sets to facilitate …
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Dystopian Trademark Revelations, Amanda Levendowski
Dystopian Trademark Revelations, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Uncovering dystopian technologies is challenging. Nondisclosure agreements, procurement policies, trade secrets, and strategic obfuscation collude to shield the development and deployment of these technologies from public scrutiny until it is too late to combat them with law or policy. But occasionally, exposing dystopian technologies is simple. Corporations choose technology trademarks inspired by dystopian philosophies and novels or similar elements of real life—all warnings that their potential uses are dystopian as well. That pronouncement is not necessarily trumpeted on social media or corporate websites, however. It is revealed in a more surprising place: trademark registrations at the U.S. Patent and Trademark …
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series
The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.
The Freedom Of Influencing, Hannibal Travis
The Freedom Of Influencing, Hannibal Travis
University of Miami Law Review
Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Washington Journal of Law, Technology & Arts
Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …
Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga
Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga
Law Faculty Publications
While patents, patent litigation, and patent pools have been part of the automotive industry since the late-1800s, the prevalence of technology covered by standards and accompanying standard essential patents (SEPs) is much more recent. Today’s smart cars and the widespread incorporation of telecommunication and Internet of Things standards in vehicles raise concerns about how well the automotive industry will be able to adapt to this new SEP-laden future. This article predicts that predatory infringement of SEPs for two related reasons. First, although some industries, such as telecommunications, have long dealt with SEPs, the incorporation of standardized technology is more recent …
How Santa Clara Law's "Tech Edge Jd" Program Improves The School's Admissions Yield, Diversity, & Employment Outcomes, Laura Lee Norris, Eric Goldman
How Santa Clara Law's "Tech Edge Jd" Program Improves The School's Admissions Yield, Diversity, & Employment Outcomes, Laura Lee Norris, Eric Goldman
Marquette Intellectual Property & Innovation Law Review
No abstract provided.
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
Seattle University Law Review
If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …
Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin
Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin
Georgetown Law Faculty Publications and Other Works
Legal discourse in the digital public square is driven by memoranda, motions, briefs, contracts, legislation, testimony, and judicial opinions. And as lawyers are taught from their first day of law school, the strength of these genres of legal communication is built on authority. But finding that authority often depends on a duopoly of for-profit legal research resources: Westlaw and Lexis. Although contemporary legal practice relies on these databases, they are far from ethically neutral. Not only are these “data cartels” expensive-- creating significant access to justice challenges--they also are controlled by parent companies that profit by providing information to Immigration …
Highly Automated Vehicles & Discrimination Against Low-Income Persons, William H. Widen
Highly Automated Vehicles & Discrimination Against Low-Income Persons, William H. Widen
Articles
Law reform in the United States often reflects a structural bias that advances narrow business interests without addressing broader public interest concerns.' This bias may appear by omitting protective language in laws or regulations which address a subject matter area, such as permitting the testing of highly automated vehicles ("HA Vs") on public roads, while omitting a requirement for a reasonable level of insurance as a condition to obtain a testing permit.2 This Article explores certain social and economic justice implications of laws and regulations governing the design, testing, manufacture, and deployment of HA Vs which might advance a business …
Teaching Doctrine For Justice Readiness, Amanda Levendowski
Teaching Doctrine For Justice Readiness, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Clinics strive to teach students lawyering skills. But clinics should also teach students how to use those skills to confront injustice and promote justice, an approach Jane Aiken refers to as “justice readiness.” Casework for clients presents many opportunities for students to become justice ready, but not all matters do so equally. Clinics come with built-in limitations. Some matters involve injustices in one area of law while leaving others untouched. And others don’t require creative advocacy for justice. Casework remains a powerful driver of justice readiness, but it cannot do the job alone.
Teaching students doctrine through a social justice …
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
Competition And Innovation: The Breakup Of Ig Farben, Felix Poege
Competition And Innovation: The Breakup Of Ig Farben, Felix Poege
Faculty Scholarship
The relationship between competition and innovation is difficult to disentangle, as exogenous variation in market structure is rare. The 1952 breakup of Germany’s leading chemical company, IG Farben, represents such a disruption. After the Second World War, the Allies occupying Germany imposed the breakup because of IG Farben’s importance for the German war economy instead of standard antitrust concerns. In technology areas where the breakup reduced concentration, patenting increased strongly, driven by domestic firms unrelated to IG Farben. An analysis of patent texts shows that an increased propensity to patent does not drive the effect. Descriptively, IG Farben’s successors increased …
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Resisting Face Surveillance With Copyright Law, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Face surveillance is animated by deep-rooted demographic and deployment biases that endanger marginalized communities and threaten the privacy of all. But current approaches have not prevented its adoption by law enforcement. Some companies have offered voluntary moratoria on selling the technology, leaving many others to fill in the gaps. Legislators have enacted regulatory oversight at the state and city levels, but a federal ban remains elusive. Both approaches require vast shifts in practical and political will, each with drawbacks. While we wait, face surveillance persists. This Article suggests a new possibility: face surveillance is fueled by unauthorized copies and reproductions …
Reconstruction Of The Reasonable Person Standard Under Chinese Patent Law, Weihong Yao, Robert H. Hu
Reconstruction Of The Reasonable Person Standard Under Chinese Patent Law, Weihong Yao, Robert H. Hu
Faculty Articles
The standard of a Reasonable Person is the common basis for determining the duty of care of a patent infringer. Under the Chinese patent law, the standards for Reasonable Manufacturer and Reasonable Importer are among the highest standards in the world; such high Chinese standards impose an excessive duty of care for Chinese manufacturing enterprises, importers, and distributors, which hinder the development of those enterprises. We should reconstruct the Chinese patent law's Reasonable Person standard based on the characteristics of the patent system and the status quo of China's economic production. A Reasonable Manufacturer should be defined as an ordinary …
Games Without Frontiers: The Increasing Importance Of Intellectual Property Rights In The People’S Republic Of China, James M. Cooper
Games Without Frontiers: The Increasing Importance Of Intellectual Property Rights In The People’S Republic Of China, James M. Cooper
Faculty Scholarship
Intellectual property (“IP”) protection in the People's Republic of China has been murky and amorphous. The country is currently enjoying a historic era with significant infrastructure and investment projects occurring as the Chinese consumer society substantially expands. These simultaneous trends require that China commit to the securitization and protection of IP rights to sustain its rapid economic growth.
Tangibility As Technology, Joao Marinotti
Tangibility As Technology, Joao Marinotti
Georgia State University Law Review
Property law has traditionally relied on tangible boundaries to delineate legal thinghood and to inform the bounds of in rem rights and duties. Unfortunately, property doctrines have fossilized around tangibility, causing fragmentation in the legal treatment of digital assets. In the United States, for example, cryptocurrencies and non-fungible tokens (NFTs) may simultaneously be classified as commodities, securities, currencies, assets, or not property at all, depending on the jurisdiction, domain, or specific asset in question. This fragmented system of overlapping legal treatments increases the information cost of using digital assets, decreases efficiency, and ultimately hinders future innovation. In this Article, I …
Code Ownership : Plagiarism And Use, Alexis Nicole Amore
Code Ownership : Plagiarism And Use, Alexis Nicole Amore
Theses, Dissertations and Culminating Projects
Technology is moving at unmeasurable rates to that of law. Ownership rights and legality become harder to grasp distant theories. With community code-sharing and limiting language structures, when does code become plagiarized or entity-owned? The disciplines of Cyberlaw and computer science are used to provide a better understanding.
The Cyberlaw discipline explores how jurisdiction views cyberspace, source code, and source code’s placement within legislation. Due to cyberspace’s ever-evolving nature, litigation struggles to encompass the possibilities within it. Computer science delves into theory-based excursions that define the law’s shape in the cyber realm. It bolsters the possibility of implementing progressive legislation …
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
Articles in Law Reviews & Other Academic Journals
The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …
Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan
Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan
Articles in Law Reviews & Other Academic Journals
The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer "without authorization or exceeding authorized access," has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals split on the proper construction and the Supreme Courtset to consider the law in its current October Term 2020.
This article considers the CFAA in a new light, namely its effects on competition. Rather than merely preventing injurious trespass upon computers, …
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Catholic University Journal of Law and Technology
The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
Catholic University Journal of Law and Technology
The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.