Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Law

The Future Of Freedom Of Expression Online, Evelyn Mary Aswad Dec 2018

The Future Of Freedom Of Expression Online, Evelyn Mary Aswad

Duke Law & Technology Review

Should social media companies ban Holocaust denial from their platforms? What about conspiracy theorists that spew hate? Does good corporate citizenship mean platforms should remove offensive speech or tolerate it? The content moderation rules that companies develop to govern speech on their platforms will have significant implications for the future of freedom of expression. Given that the prospects for compelling platforms to respect users’ free speech rights are bleak within the U.S. system, what can be done to protect this important right? In June 2018, the United Nations’ top expert for freedom of expression called on companies to align their …


Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire Nov 2018

Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire

Duke Law & Technology Review

The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate students’ constitutional …


Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino Aug 2018

Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino

Georgia State University Law Review

Algorithms saturate our lives today; from curated song lists to recommending “friends” and news feeds, they factor into some of the most human aspects of decision-making, tapping into preferences based on an ever-growing amount of data. Regardless of whether the algorithm pertains to routing you around traffic jams or finding your next dinner, there is little regulation and even less transparency regarding just how these algorithms work. Paralleling this societal adoption, the criminal justice system now employs algorithms in some of the most important aspects of investigation and decision-making.

The lack of oversight is abundantly apparent in the criminal justice …


The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman Aug 2018

The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman

Georgia State University Law Review

As this Article sets forth, once a computerized algorithm is used by the government, constitutional rights may attach. And, at the very least, those rights require that algorithms used by the government as evidence in criminal trials be made available—both to litigants and the public. Scholars have discussed how the government’s refusal to disclose such algorithms runs afoul of defendants’ constitutional rights, but few have considered the public’s interest in these algorithms—or the widespread impact that public disclosure and auditing could have on ensuring their quality.

This Article aims to add to that discussion by setting forth a theory of …


United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko Mar 2018

United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko

Greg Sergienko

Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court to …


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko Mar 2018

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Social Media And The Government: Why It May Be Unconstitutional For Government Officials To Moderate Their Social Media, Alex Hadjian Jan 2018

Social Media And The Government: Why It May Be Unconstitutional For Government Officials To Moderate Their Social Media, Alex Hadjian

Loyola of Los Angeles Law Review

No abstract provided.


United States V. Ammons, Rebecca Ruffer Jan 2018

United States V. Ammons, Rebecca Ruffer

NYLS Law Review

No abstract provided.


Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney Jan 2018

Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney

Articles, Book Chapters, & Popular Press

Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.


Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover Jan 2018

Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover

Publications

Moderator: Professor Gregory Silverman.

Book discussed: Ronald L. Collins & David M. Skover, Robotica: Speech Rights and Artificial Intelligence (Cambridge Univ. Press 2018).