Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 61 - 63 of 63

Full-Text Articles in Law

You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr Jan 2021

You Can't Trust Everything On The Internet: A Look Into Texas' And Maryland's Approach Of Social Media Authentication, Danielle Orr

Catholic University Journal of Law and Technology

If unauthenticated evidence is admitted into the court's record, and makes a defendant’s charge more probable, that defendant’s Fifth and Fourteenth Amendment rights to life and liberty have been violated. Social media evidence, due to the ease of hacking and catfishing, can be unreliable, thus Maryland and Texas have led the way, with two respective approaches, on how to handle such evidence. Maryland, with its proscribed three authentication methods, has a less trusting view of social media, and realizes the dangers wrongfully entered evidence may have on a defendant’s due process. Alternatively, Texas has not heighten scrutiny on social media …


The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani Jan 2021

The Fsia And Cyberspace: Could Hact Be The Answer?, Ritika Malkani

Catholic University Journal of Law and Technology

Under the non-commercial tort exception to the Foreign Sovereign Immunities Act (FSIA), a tort committed by a foreign state must occur wholly within the United States in order to trigger jurisdiction and liability in an American court. As such, cybercrimes which are committed abroad, even if targeted at and cause harm to U.S. citizens, fall outside this exception, leaving injured parties with no domestic avenue of redress. Potential solutions to closing this gap in the legal framework include the proposed Homeland and Cyber Threat Act (HACT), expansion of the FSIA's terrorism exception, or overruling the entire tort doctrine.


Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist Jan 2021

Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist

Catholic University Journal of Law and Technology

The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …