Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Blockchain (3)
- Contracts (2)
- Cryptocurrency (2)
- Administrative law (1)
- Administrative state (1)
-
- Agency rule (1)
- All people are created equal (1)
- Artificial beings (1)
- Australia (1)
- Big-tech companies (1)
- Bill of Attainder Clause (1)
- Block.one (1)
- Blockchains (1)
- Canons (1)
- Citizens United (1)
- Congress (1)
- Constitutional rights (1)
- Corporate entity (1)
- Corporate personhood (1)
- Crypto (1)
- Cryptocurrencies (1)
- Cyber-attacks; cyber-crime; information security; cybersecurity; Ponemon Institute; data sharing; data breach; Securities Exchange Commission; SEC; hacking; information technology system; phishing; Department of Justice; DOJ; cybercriminal; malware; spyware; IT; Denial of Service Attacks; DoS; DDoS; Distributed Denial of Service campaign; third-party vendor attack; Dumpster Diving; Economic Espionage; Trade Secret Misappropriation; Office of Compliance Inspections and Examinations; OCIE; Financial Industry Regulatory Authority; FINRA; broker-dealer; Risk Alert; Regulation S-P; Gramm-Leach-Bliley Act; GLBA; Computer Fraud and Abuse Act; CFAA; protected computer; United States v. Valle; Electronic Communications Privacy Act; ECPA; The Wiretap Act; The Stored Communications Act; SCA; The Pen Registry Act; Federal Trade Commission; FTC; Federal Deposit Insurance Corporation; FDIC; Federal Reserve; Economic Espionage Act; EEA; Defend Trade Secrets Act; DTSA; Huawei Technologies Co.; Cybersecurity Disclosure Act of 2017 and 2018; common law; class action; standing; Rule 23(a); 23(b)(3); negligence; breach of contract; derivative shareholder suits; Wyndham Worldwide Corporation; Regulatory Systems Compliance and Integrity; SCI; Regulation S-ID; Regulation S-P; General Disclosure Provisions; 503(c); Regulation S-K; Description of Business; financial statements; Framework for Improving Critical Infrastructure Cybersecurity; compliance; disaster plan; plaintext; ciphertext; crisis management; due diligence; The Protecting Cyber Networks Act; PCNA; National Cybersecurity Protection Advancement Act of 2015; NCPAA; The Cybersecurity Information Sharing Act; CISA; Privacy and Civil Liberties Oversight Board; Department of Homeland Security; DHS; National Cybersecurity and Communications Integration Center; NCIC; U.S. Chamber of Commerce Leadership Council; (1)
- Decentralization (1)
- Democratic society (1)
- Digital coin (1)
- Digital token (1)
- Electoral process (1)
- Employment (1)
- Equal opportunity (1)
- Equitable sharing (1)
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Computer Law
How Supreme Court Precedent Sheds Light On Corporate Bill Of Attainder Claims, Alina Veneziano
How Supreme Court Precedent Sheds Light On Corporate Bill Of Attainder Claims, Alina Veneziano
Seattle Journal for Social Justice
No abstract provided.
Two Decades Of Laws And Practice Around Screen Scraping In The Common Law World And Its Open Banking Watershed Moment, Han-Wei Liu
Two Decades Of Laws And Practice Around Screen Scraping In The Common Law World And Its Open Banking Watershed Moment, Han-Wei Liu
Washington International Law Journal
Screen scraping—a technique using an agent to collect, parse, and organize data from the web in an automated manner—has found countless applications over the past two decades. It is now employed everywhere, from targeted advertising, price aggregation, budgeting apps, website preservation, academic research, and journalism, to name a few. However, this tool has raised enormous controversy in the age of big data. This article takes a comparative law approach to explore two sets of analytical issues in three common law jurisdictions, the United States, the United Kingdom, and Australia. As the first step, this article maps out the trajectory of …
Enough Is As Good As A Feast, Noah C. Chauvin
Enough Is As Good As A Feast, Noah C. Chauvin
Seattle University Law Review
Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness
Brooklyn Journal of Corporate, Financial & Commercial Law
Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …
Payment In Virtual Currency, Benjamin Geva
Payment In Virtual Currency, Benjamin Geva
Articles & Book Chapters
By reference to an analysis of the operation of payment in traditional forms of money, this essay explores the meaning of ‘virtual currency’ and the mechanism for payment in it. Endeavoring to identify directions in which events will unfold, the essay sets the stage for a future detailed analysis of pertaining legal aspects.
Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason
Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason
Faculty Publications
Smart contracts and cryptocurrencies have sparked considerable interest among legal scholars in recent years, and a growing body of scholarship focuses on whether smart contracts and cryptocurrencies can sidestep law and regulation altogether. Bitcoin is famously decentralized, without any central actor controlling the system. Its users remain largely anonymous, using alphanumeric addresses instead of legal names. Ethereum shares these traits and also supports smart contracts that can automate the transfer of the Ethereum cryptocurrency (known as ether). Ethereum also supports specialized "tokens" that can be tied to the ownership of assets, goods, and services that exist completely outside of the …
The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz
The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz
Vanderbilt Journal of Entertainment & Technology Law
A new form of blockchain governance involving the use of formal games that incentivize participants to identify focal resolutions to normative questions is emerging. This symposium contribution provides a brief survey of the literature proposing and critiquing the use of such mechanisms of decentralized decision-making, and it evaluates early laboratory and real-world experiments with this approach.
In Memory Of Professor James E. Bond, Janet Ainsworth
In Memory Of Professor James E. Bond, Janet Ainsworth
Seattle University Law Review
Janet Ainsworth, Professor of Law at Seattle University School of Law: In Memory of Professor James E. Bond.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman
Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman
All Faculty Scholarship
Deals accomplished through software persistently residing on computer networks—sometimes called smart contracts, but better termed transactional scripts—embody a potentially revolutionary contracting innovation. Ours is the first precise account in the legal literature of how such scripts are created, and when they produce errors of legal significance.
Scripts’ most celebrated use case is for transactions operating exclusively on public, permissionless, blockchains: such exchanges eliminate the need for trusted intermediaries and seem to permit parties to commit ex ante to automated performance. But public transactional scripts are costly both to develop and execute, with significant fees imposed for data storage. Worse, bugs …