Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

The Consumer Bundle, Shelly Kreiczer-Levy Mar 2024

The Consumer Bundle, Shelly Kreiczer-Levy

Washington Law Review

Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real Jan 2024

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real

Washington Law Review Online

In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …


Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen Dec 2023

Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen

Articles

In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …


Startup Biases, Jennifer S. Fan Apr 2023

Startup Biases, Jennifer S. Fan

Articles

This Article provides an original descriptive account of bias in the startup context and explains why litigation is eschewed and what happens when it is used as a mechanism to combat bias in the venture capital ecosystem. Further, this Article identifies two particular phenomena in the startup context that exacerbate gender and racial bias. First, homophily—the idea that like attracts like—abounds and has been part of the DNA of venture capital since its inception. The thick networks that developed as venture capital made its way from the East Coast to the West Coast were limited to an elite group that …


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


The Law Of Blockchain, Georgios Dimitropoulos Oct 2020

The Law Of Blockchain, Georgios Dimitropoulos

Washington Law Review

Blockchain technology is a new general-purpose technology that poses significant challenges to the existing state of law, economy, and society. Blockchain has one feature that makes it even more distinctive than other disruptive technologies: it is, by nature and design, global and transnational. Moreover, blockchain operates based on its own rules and principles that have a law-like quality. What may be called the lex cryptographia of blockchain has been designed based on a rational choice vision of human behavior. Blockchain adopts a framing derived from neoclassical economics, and instantiates it in a new machinery that implements rational choice paradigms using …


Taxation And Surveillance: An Agenda, Michael Hatfield Jan 2015

Taxation And Surveillance: An Agenda, Michael Hatfield

Articles

Among government agencies, the IRS likely has the surest legal claim to the most information about the most Americans: their hobbies, religious affiliations, reading activities, travel, and medical information are all potentially tax relevant. Privacy scholars have studied the arrival of Big Data, the internet-of-things, and the cooperation of private companies with the government in surveillance, but neither privacy nor tax scholars have considered how these technological advances should impact the U.S. tax system. As government agencies and private companies increasingly pursue what has been described as the “growing gush of data,” the use of these technologies in tax administration …


Equity And Efficiency In Intellectual Property Taxation, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2010

Equity And Efficiency In Intellectual Property Taxation, Xuan-Thao Nguyen, Jeffrey A. Maine

Articles

This article examines the federal income tax regime governing intellectual property using normative criteria in evaluating taxes: equity and efficiency. The article first evaluates the current intellectual property tax scheme in terms of horizontal equity, identifying differences in tax treatment of what appear to be similar intellectual property activities. It argues that disparate tax treatments between seemingly similar intellectual property owners signal that flaws may exist in the tax system. The article then assesses the efficiency of the intellectual property tax system, examining numerous tax subsidies for intellectual property and their effectiveness in promoting economic growth. It argues that many …


Acquiring Innovation, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2008

Acquiring Innovation, Xuan-Thao Nguyen, Jeffrey A. Maine

Articles

In recent years, the innovation market has witnessed a new business model involving companies that are mere patent holding shells and not operating entities. They have no customers or products to offer, but they do have an aggressive tactic of using patent portfolios to threaten other operating companies with potential infringement litigation. The strategy is executed with the end goal of extracting handsome settlements. Acquisitions of patents for offensive use have become a major concern to operating companies because such acquisitions pose the threats of patent injunction, interrupting the business and crippling further innovation.

While many operating companies today know …