Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Computer Law

Robots As Pirates, Henry H. Perritt Jr. Jan 2024

Robots As Pirates, Henry H. Perritt Jr.

Catholic University Law Review

Generative AI has created much excitement over its potential to create new works of authorship in the literary and graphical realms. Its underling machine-learning technology works by analyzing the relations among elements of preexisting material in enormous databases assembled from publicly available and licensed sources. Its algorithms “learn” to predict “what comes next” in different types of expression. A complete system thus can become glib in creating new factual summaries, essays, fictional stories and images.

A number of authors of the raw material used by Generative AI engines claim that the machine learning process infringes their copyrights. Careful evaluation of …


Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman Jan 2023

Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman

Catholic University Journal of Law and Technology

The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.

This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …


New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya Jan 2023

New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya

Catholic University Journal of Law and Technology

A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


What's In Your Box? Removing The Tiffany Standard Of Knowledge In Online Marketplaces, Hayley Dunn Jan 2021

What's In Your Box? Removing The Tiffany Standard Of Knowledge In Online Marketplaces, Hayley Dunn

Catholic University Journal of Law and Technology

Online shopping is a quintessential component of modern life. Millions of products from trusted brands are conveniently available at single-stop online marketplaces such as Amazon, eBay, and Alibaba with the click of a button from the comfort of home. But is the product delivered to the consumer’s front door actually the same as the one found on a store shelf? Pervasive trademark infringement in online marketplaces makes the answer to this question difficult, that is, until the consumer experiences negative consequences from a counterfeited product.

Under Tiffany (NJ) Inc. v. eBay, Inc., online marketplaces face almost no liability …


The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland Jan 2020

The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland

Catholic University Journal of Law and Technology

Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton May 2016

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal May 2016

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler Dec 2015

Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler

Catholic University Journal of Law and Technology

No abstract provided.


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao Dec 2015

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.