Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (4)
- Antitrust (2)
- Copyright (2)
- Cyberspace (2)
- E-Commerce (2)
-
- Facebook (2)
- Jurisdiction (2)
- Yahoo (2)
- 875(c) (1)
- AI (1)
- Abortion (1)
- Administration (1)
- Administrative law (1)
- Agreement on Trade Related Aspects of Intellectual Property (1)
- Algorithmic interpretability (1)
- Antitrust law and competition law (1)
- Antitrust law and trade regulation (1)
- Bankruptcy (1)
- Big tech (1)
- Censorship (1)
- Communications law and policy (1)
- Computer law and the law of the internet (1)
- Computers (1)
- Constitutional law (1)
- Copyright Act (1)
- Counterfeit goods (1)
- Critical infrastructure (1)
- Crypto currency (1)
- Cyber (1)
- Cybersecurity (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 20 of 20
Full-Text Articles in Law
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk
About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk
Northwestern Journal of Technology and Intellectual Property
This Note examines whether Facebook’s restrictions on its users’ posts are subject to Sherman Act § 2. This Note looks at the economic activity generated by social media activity and argues that posts are commerce. While this piece finds that current antitrust jurisprudence likely favors Facebook, an alternative approach sought by some antitrust scholars could influence judges to preclude the platform’s restrictions.
The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar
The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar
Northwestern Journal of Technology and Intellectual Property
Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor …
Compulsory Licensing: A Potential Solution To The Antitrust Dilemma Of Technology Standards Setting, Shen Peng
Compulsory Licensing: A Potential Solution To The Antitrust Dilemma Of Technology Standards Setting, Shen Peng
Northwestern Journal of Technology and Intellectual Property
The Constitution grants patent owners exclusive rights over their inventions to “promote the Progress of Science.”1 This clause was drafted based on the belief that monetary incentives granted to the first inventor, such as the proceeds from selling and licensing the invention, will foster new ideas and accelerate innovation to the benefit of the public welfare. However, when the first inventor is the sole benefactor of the rewards from the innovation, subsequent innovation may be stifled.
For instance, the first person to invent the idea of a mobile phone but lacking the right to use the underlying technologies essential to …
The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor
The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor
Northwestern Journal of Technology and Intellectual Property
To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …
The Crypto Quandary: Is Bankruptcy Ready?, Megan Mcdermott
The Crypto Quandary: Is Bankruptcy Ready?, Megan Mcdermott
Northwestern University Law Review
As the United States grapples with how best to manage a global pandemic, bankruptcy courts are bracing for the inevitable fallout from COVID-19. As we saw in the wake of the 2008 financial crisis, hard- hit businesses will need to reorganize to adjust to new conditions, while out- of-work consumers will need debt relief options. But there will be a new twist for this impending wave of bankruptcies: how should bankruptcy courts deal with crypto assets like Bitcoin? This Essay argues that the rise of cryptocurrency investments over the last decade poses serious complications for the next round of consumer …
Alibaba, Amazon, And Counterfeiting In The Age Of The Internet, Daniel C.K. Chow
Alibaba, Amazon, And Counterfeiting In The Age Of The Internet, Daniel C.K. Chow
Northwestern Journal of International Law & Business
The advent of e-commerce marketplaces such as Alibaba and Amazon in the new millennium has led to the proliferation of the sale of counterfeit goods around the world through the Internet. Brand owners find that Internet counterfeiters operating in the digital world present even more challenges than those using only brick-and-mortar operations. Internet counterfeiters have unprecedented access to consumers. They use false identities and addresses and vanish into cyberspace at the first sign of trouble. Brand owners seeking help from Alibaba and Amazon to remove listings of counterfeits have become frustrated by their convoluted and labyrinthine notice and take-down procedures. …
Prosecuting Online Threats After Elonis, Michael Pierce
Prosecuting Online Threats After Elonis, Michael Pierce
Northwestern University Law Review
In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …
Regulating Cyber-Security, Nathan Alexander Sales
Regulating Cyber-Security, Nathan Alexander Sales
Northwestern University Law Review
The conventional wisdom is that this country’s privately owned critical infrastructure—banks, telecommunications networks, the power grid, and so on—is vulnerable to catastrophic cyber-attacks. The existing academic literature does not adequately grapple with this problem, however, because it conceives of cyber-security in unduly narrow terms: most scholars understand cyber-attacks as a problem of either the criminal law or the law of armed conflict. Cyber-security scholarship need not run in such established channels. This Article argues that, rather than thinking of private companies merely as potential victims of cyber-crimes or as possible targets in cyber-conflicts, we should think of them in administrative …
Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg
Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg
Northwestern University Law Review
No abstract provided.
International Cryptography Regulation And The Global Information Economy, Nathan Saper
International Cryptography Regulation And The Global Information Economy, Nathan Saper
Northwestern Journal of Technology and Intellectual Property
With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.
This Note seeks to introduce the reader to the issue of international cryptography regulation …
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
Northwestern Journal of Technology and Intellectual Property
With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …
Do-Not-Track As Default, Joshua A.T. Fairfield
Do-Not-Track As Default, Joshua A.T. Fairfield
Northwestern Journal of Technology and Intellectual Property
Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature.
The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …
Check-In, Attendees Of The Symposium
Check-In, Attendees Of The Symposium
NJTIP Annual Symposium
Check-in for the Northwestern Journal of Technology and Intellectual Property's 7th Annual Symposium
Supervising Managed Services, James B. Speta
Supervising Managed Services, James B. Speta
Faculty Working Papers
Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …
Personal Jurisdiction For Internet Torts: Towards An International Solution, Holger P. Hestermeyer
Personal Jurisdiction For Internet Torts: Towards An International Solution, Holger P. Hestermeyer
Northwestern Journal of International Law & Business
As an introduction to the issue of Internet tort jurisdiction, Part I will recount the Yahoo! case, the most divisive case on the issue recently. Parts II and III will give an overview of the current law on Internet tort jurisdiction in two different legal systems: the United States and Germany. They will show that several recent cases in both countries have applied targeting approaches as advocated by Michael Geist and Rufus Pichler. However, insecurity remains and jurisprudence is far from consistent. Part IV will argue that insecurity about Internet jurisdiction could be reduced significantly if countries were to commit …
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
Northwestern Journal of International Law & Business
The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …
International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic
International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic
Northwestern Journal of International Law & Business
This article examines some features of virtual arbitration and argues that the use of new technology and the development of e-commerce raise some interesting questions to international arbitration laws. Part It describes initiatives to develop online dispute resolution. Part III discusses virtual dispute resolution centers, including, how, why, and where they function. More importantly, however, Part III investigates the differences between online and off-line arbitration, where the focus remains on three questions. The first question is a crucial one. It has been debated by scholars and practitioners but still remains unresolved: will arbitration agreements concluded online and arbitration awards rendered …
Internet Jurisdiction Today, Adria Allen
Internet Jurisdiction Today, Adria Allen
Northwestern Journal of International Law & Business
This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …
The Proposed E.U. Vat On Electronically Transmitted Services: Enforcement And Compliance Issues, Thomas Fawkes
The Proposed E.U. Vat On Electronically Transmitted Services: Enforcement And Compliance Issues, Thomas Fawkes
Northwestern Journal of International Law & Business
This paper will begin by discussing the current VAT system in the E.U. It will also describe in detail the provisions of the proposed VAT amendments as they affect electronic commerce transactions with respect to both B2B and B2C transactions. Next, the practical effects of the VAT amendments in terms of increased VAT revenue for the E.U. and its mem-ber states will be discussed. Following will be a discussion on the past and present failures of the E.U. and its Member States in encouraging and en-forcing compliance under the current VAT Directive, and the implication of such failures on the …