Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Law

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon Dec 2016

Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor Sep 2016

Shedding Light On The "Going Dark" Problem And The Encryption Debate, John Mylan Traylor

University of Michigan Journal of Law Reform

In an effort to protect the enormous volume of sensitive and valuable data that travels across the Internet and is stored on personal devices, private companies have created encryption software to secure data from criminals, hackers, and terrorists who wish to steal it. The greatest benefit of encryption also creates the biggest problem: Encryption software has become so secure that often not even the government can bypass it. The “Going Dark” problem—a scenario in which the government has obtained the legal authority to search a suspected criminal’s encrypted device but lacks the technical ability to do so—is becoming increasingly common. …


Generic Pharmaceuticals And The "Unfortunate Hand" Dealt To Harmed Consumers: The Emerging State Court Resistance, Arlen W. Langvardt Jun 2016

Generic Pharmaceuticals And The "Unfortunate Hand" Dealt To Harmed Consumers: The Emerging State Court Resistance, Arlen W. Langvardt

Minnesota Journal of Law, Science & Technology

No abstract provided.


It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow Jun 2016

It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow

Minnesota Journal of Law, Science & Technology

No abstract provided.


Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank Jan 2016

Data Breaches, Identity Theft And Article Iii Standing: Will The Supreme Court Resolve The Split In The Circuits, Bradford Mank

Faculty Articles and Other Publications

In data breach cases, the lower federal courts have split on the question of whether the plaintiffs meet Article III standing requirements for injury and causation. In its 2013 decision Clapper v. Amnesty International USA, the Supreme Court, in a case involving alleged electronic surveillance by the U.S. government’s National Security Agency, declared that a plaintiff alleging that it will suffer future injuries from a defendant’s allegedly improper conduct must show that such injuries are “certainly impending.” Since the Clapper decision, a majority of the lower federal courts addressing “lost data” or potential identity theft cases in which there is …


Reauthorizing The Fisa Amendments Act: A Blueprint For Enhancing Privacy Protections And Preserving Foreign Intelligence Capabilities, Peter Margulies Jan 2016

Reauthorizing The Fisa Amendments Act: A Blueprint For Enhancing Privacy Protections And Preserving Foreign Intelligence Capabilities, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein Jan 2016

Standing Up For Their Data: Recognizing The True Nature Of Injuries In Data Breach Claims To Afford Plaintiffs Article Iii Standing, Andrew Braunstein

Journal of Law and Policy

Over the last several years, data breaches have become increasingly more common, due in no small part to the failures of organizations charged with storing and protecting personal data. Consumers whose data has fallen victim to these breaches are more often turning to federal courts in attempts to be made whole from the loss of their information, whether simple credit card information or, as breaches become more sophisticated, social security information, medical and financial records, and more. These consumers are often being turned away from the courthouse, however, due to a failure of many federal courts to find that the …


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Jan 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Publications

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve Jan 2016

The Amplified Need For Supreme Court Guidance On Student Speech Rights In The Digital Age, William Calve

St. Mary's Law Journal

Abstract forthcoming.


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …