Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Law

Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove Jan 2024

Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove

Northwestern University Law Review

Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.

Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …


About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk Apr 2023

About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk

Northwestern Journal of Technology and Intellectual Property

This Note examines whether Facebook’s restrictions on its users’ posts are subject to Sherman Act § 2. This Note looks at the economic activity generated by social media activity and argues that posts are commerce. While this piece finds that current antitrust jurisprudence likely favors Facebook, an alternative approach sought by some antitrust scholars could influence judges to preclude the platform’s restrictions.


The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar Apr 2023

The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar

Northwestern Journal of Technology and Intellectual Property

Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor …


Compulsory Licensing: A Potential Solution To The Antitrust Dilemma Of Technology Standards Setting, Shen Peng Apr 2023

Compulsory Licensing: A Potential Solution To The Antitrust Dilemma Of Technology Standards Setting, Shen Peng

Northwestern Journal of Technology and Intellectual Property

The Constitution grants patent owners exclusive rights over their inventions to “promote the Progress of Science.”1 This clause was drafted based on the belief that monetary incentives granted to the first inventor, such as the proceeds from selling and licensing the invention, will foster new ideas and accelerate innovation to the benefit of the public welfare. However, when the first inventor is the sole benefactor of the rewards from the innovation, subsequent innovation may be stifled.

For instance, the first person to invent the idea of a mobile phone but lacking the right to use the underlying technologies essential to …


The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor Nov 2022

The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor

Northwestern Journal of Technology and Intellectual Property

To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …


The Crypto Quandary: Is Bankruptcy Ready?, Megan Mcdermott Apr 2021

The Crypto Quandary: Is Bankruptcy Ready?, Megan Mcdermott

Northwestern University Law Review

As the United States grapples with how best to manage a global pandemic, bankruptcy courts are bracing for the inevitable fallout from COVID-19. As we saw in the wake of the 2008 financial crisis, hard- hit businesses will need to reorganize to adjust to new conditions, while out- of-work consumers will need debt relief options. But there will be a new twist for this impending wave of bankruptcies: how should bankruptcy courts deal with crypto assets like Bitcoin? This Essay argues that the rise of cryptocurrency investments over the last decade poses serious complications for the next round of consumer …


Alibaba, Amazon, And Counterfeiting In The Age Of The Internet, Daniel C.K. Chow Jan 2020

Alibaba, Amazon, And Counterfeiting In The Age Of The Internet, Daniel C.K. Chow

Northwestern Journal of International Law & Business

The advent of e-commerce marketplaces such as Alibaba and Amazon in the new millennium has led to the proliferation of the sale of counterfeit goods around the world through the Internet. Brand owners find that Internet counterfeiters operating in the digital world present even more challenges than those using only brick-and-mortar operations. Internet counterfeiters have unprecedented access to consumers. They use false identities and addresses and vanish into cyberspace at the first sign of trouble. Brand owners seeking help from Alibaba and Amazon to remove listings of counterfeits have become frustrated by their convoluted and labyrinthine notice and take-down procedures. …


Prosecuting Online Threats After Elonis, Michael Pierce Jun 2016

Prosecuting Online Threats After Elonis, Michael Pierce

Northwestern University Law Review

In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …


Regulating Cyber-Security, Nathan Alexander Sales Jan 2015

Regulating Cyber-Security, Nathan Alexander Sales

Northwestern University Law Review

The conventional wisdom is that this country’s privately owned critical infrastructure—banks, telecommunications networks, the power grid, and so on—is vulnerable to catastrophic cyber-attacks. The existing academic literature does not adequately grapple with this problem, however, because it conceives of cyber-security in unduly narrow terms: most scholars understand cyber-attacks as a problem of either the criminal law or the law of armed conflict. Cyber-security scholarship need not run in such established channels. This Article argues that, rather than thinking of private companies merely as potential victims of cyber-crimes or as possible targets in cyber-conflicts, we should think of them in administrative …


Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg Jan 2015

Doma's Ghost And Copyright Reversionary Interests, Brad A. Greenberg

Northwestern University Law Review

No abstract provided.


International Cryptography Regulation And The Global Information Economy, Nathan Saper Sep 2013

International Cryptography Regulation And The Global Information Economy, Nathan Saper

Northwestern Journal of Technology and Intellectual Property

With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.

This Note seeks to introduce the reader to the issue of international cryptography regulation …


The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang Sep 2013

The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang

Northwestern Journal of Technology and Intellectual Property

With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Northwestern Journal of Technology and Intellectual Property

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature.

The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …


Check-In, Attendees Of The Symposium Feb 2012

Check-In, Attendees Of The Symposium

NJTIP Annual Symposium

Check-in for the Northwestern Journal of Technology and Intellectual Property's 7th Annual Symposium


Supervising Managed Services, James B. Speta Jan 2011

Supervising Managed Services, James B. Speta

Faculty Working Papers

Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …


Personal Jurisdiction For Internet Torts: Towards An International Solution, Holger P. Hestermeyer Jan 2006

Personal Jurisdiction For Internet Torts: Towards An International Solution, Holger P. Hestermeyer

Northwestern Journal of International Law & Business

As an introduction to the issue of Internet tort jurisdiction, Part I will recount the Yahoo! case, the most divisive case on the issue recently. Parts II and III will give an overview of the current law on Internet tort jurisdiction in two different legal systems: the United States and Germany. They will show that several recent cases in both countries have applied targeting approaches as advocated by Michael Geist and Rufus Pichler. However, insecurity remains and jurisprudence is far from consistent. Part IV will argue that insecurity about Internet jurisdiction could be reduced significantly if countries were to commit …


How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos Jan 2002

How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos

Northwestern Journal of International Law & Business

The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …


International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic Jan 2002

International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic

Northwestern Journal of International Law & Business

This article examines some features of virtual arbitration and argues that the use of new technology and the development of e-commerce raise some interesting questions to international arbitration laws. Part It describes initiatives to develop online dispute resolution. Part III discusses virtual dispute resolution centers, including, how, why, and where they function. More importantly, however, Part III investigates the differences between online and off-line arbitration, where the focus remains on three questions. The first question is a crucial one. It has been debated by scholars and practitioners but still remains unresolved: will arbitration agreements concluded online and arbitration awards rendered …


Internet Jurisdiction Today, Adria Allen Jan 2001

Internet Jurisdiction Today, Adria Allen

Northwestern Journal of International Law & Business

This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …


The Proposed E.U. Vat On Electronically Transmitted Services: Enforcement And Compliance Issues, Thomas Fawkes Jan 2001

The Proposed E.U. Vat On Electronically Transmitted Services: Enforcement And Compliance Issues, Thomas Fawkes

Northwestern Journal of International Law & Business

This paper will begin by discussing the current VAT system in the E.U. It will also describe in detail the provisions of the proposed VAT amendments as they affect electronic commerce transactions with respect to both B2B and B2C transactions. Next, the practical effects of the VAT amendments in terms of increased VAT revenue for the E.U. and its mem-ber states will be discussed. Following will be a discussion on the past and present failures of the E.U. and its Member States in encouraging and en-forcing compliance under the current VAT Directive, and the implication of such failures on the …