Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- First Amendment (2)
- Privacy (2)
- AI (1)
- Algorithmic accountability (1)
- Algorithms (1)
-
- Artificial intelligence (1)
- Attribution (1)
- BCI (1)
- Big data (1)
- Braincomputerinterfacing (1)
- Child Entertainment (1)
- Child Entertainment Labor Law (1)
- Clarifying Lawful Overseas Use of Data Act; CLOUD Act; CLOUD Act agreements; data privacy; data protection; technology; cloud; direct access; data sharing; data protection; lawful data use; production orders; overseas production orders; international production orders; stored communications; SCA; overseas data; privacy; digital privacy; digital privacy rights; European Convention on Human Rights; international cooperation; international law; ECHR; law enforcement; international law enforcement; constitutional law; privacy; Fourth Amendment; Article 8; Article 1; criminal investigation; mutual legal assistance; mutual legal assistance treaties; mla; mlat; third country persons; us uk agreements; service provider; Verdugo-Urquidez; Microsoft Ireland; Al-Skeini; extraterritorial; extraterritoriality; territorial; territoriality; cross-border; law enforcement cooperation; comparative law; transnational law (1)
- Constitution (1)
- Criminal law (1)
- Cybersecurity (1)
- Data collection (1)
- Defamation (1)
- Due process (1)
- Emerging technology (1)
- Free Speech (1)
- International law (1)
- Internet (1)
- Labor Law (1)
- Lawmaking (1)
- Legislation (1)
- Machine learning (1)
- Non-state actors (1)
- Online (1)
- Personal data (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Computer Law
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Brooklyn Journal of International Law
The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …
Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson
Seattle University Law Review SUpra
No abstract provided.
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
Fact Or Phallus? Considering The Constitutionality Of Texas's Cyber-Flashing Law Under The True Threat Doctrine, Brenna Cheyne Miller
Fact Or Phallus? Considering The Constitutionality Of Texas's Cyber-Flashing Law Under The True Threat Doctrine, Brenna Cheyne Miller
Texas A&M Law Review
As societal reliance on digital and online communication continues to grow, courts are grappling with how best to provide legal recourse for novel, technology-related issues while still protecting American citizens’ First Amendment right to free speech. The State of Texas recently enacted Penal Code section 21.19, which criminalizes the transmission of unsolicited sexually explicit images to another person—or as it is commonly known, “cyber-flashing.” Cyber-flashing occurs through digital and online platforms, including text messages, apps, and social media. Section 21.19 is one of the first statutes of its kind in the United States. In the age of “dick pics,” this …
The District Of Columbia Circuit Finds Article Iii Standing Based On The Risk Of Future Identity Theft In In Re U.S. Office Of Personnel Management Data Security Breach Litigation, Briana L. Borgolini
The District Of Columbia Circuit Finds Article Iii Standing Based On The Risk Of Future Identity Theft In In Re U.S. Office Of Personnel Management Data Security Breach Litigation, Briana L. Borgolini
Villanova Law Review
No abstract provided.
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Catholic University Journal of Law and Technology
This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.
The Small-Er Screen: Youtube Vlogging And The Unequipped Child Entertainment Labor Laws, Amanda G. Riggio
The Small-Er Screen: Youtube Vlogging And The Unequipped Child Entertainment Labor Laws, Amanda G. Riggio
Seattle University Law Review
Family vloggers are among the millions of content creators on YouTube. In general, vloggers frequently upload recorded videos of their daily lives. Family vloggers are unique because they focus their content around their familial relationships and the lives of their children. One set of family vloggers, the Ace Family, has recorded their children’s lives from the day they were born and continue to upload videos of each milestone, including “Elle Cries on Her First Rollercoaster Ride” and “Elle and Alaïa Get Caught Doing What!! **Hidden Camera**.” Another vlogging couple, Cole and Savannah LaBrant, post similar content, including videos titled “Baby …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
The Right To Contest Ai, Margot E. Kaminski, Jennifer M. Urban
Publications
Artificial intelligence (AI) is increasingly used to make important decisions, from university admissions selections to loan determinations to the distribution of COVID-19 vaccines. These uses of AI raise a host of concerns about discrimination, accuracy, fairness, and accountability.
In the United States, recent proposals for regulating AI focus largely on ex ante and systemic governance. This Article argues instead—or really, in addition—for an individual right to contest AI decisions, modeled on due process but adapted for the digital age. The European Union, in fact, recognizes such a right, and a growing number of institutions around the world now call for …
Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner
Persuasion About/Without International Law: The Case Of Cybersecurity Norms, Steven R. Ratner
Book Chapters
International law on cybersecurity is characterized by at best a thin consensus on the existence of rules, their meaning, and the desirability and content of new rules. This legal landscape results in a unique pattern of argumentation and persuasion by states and non-state actors both in advocating for a regulatory scheme for cyber activity and in reacting to malicious cyber acts. By examining argumentation in the absence of a generally agreed legal framework, this chapter seeks to provide new insights into the motivations for and effects of international legal argumentation in shaping debates and behavior. After describing the legal landscape …