Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Journal

2018

Institution
Keyword
Publication

Articles 1 - 17 of 17

Full-Text Articles in Computer Law

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo Sep 2018

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo

San Diego International Law Journal

This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.


The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman Aug 2018

The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman

Georgia State University Law Review

As this Article sets forth, once a computerized algorithm is used by the government, constitutional rights may attach. And, at the very least, those rights require that algorithms used by the government as evidence in criminal trials be made available—both to litigants and the public. Scholars have discussed how the government’s refusal to disclose such algorithms runs afoul of defendants’ constitutional rights, but few have considered the public’s interest in these algorithms—or the widespread impact that public disclosure and auditing could have on ensuring their quality.

This Article aims to add to that discussion by setting forth a theory of …


Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino Aug 2018

Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino

Georgia State University Law Review

Algorithms saturate our lives today; from curated song lists to recommending “friends” and news feeds, they factor into some of the most human aspects of decision-making, tapping into preferences based on an ever-growing amount of data. Regardless of whether the algorithm pertains to routing you around traffic jams or finding your next dinner, there is little regulation and even less transparency regarding just how these algorithms work. Paralleling this societal adoption, the criminal justice system now employs algorithms in some of the most important aspects of investigation and decision-making.

The lack of oversight is abundantly apparent in the criminal justice …


Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson Jun 2018

Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson

Minnesota Journal of Law, Science & Technology

No abstract provided.


The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung Jun 2018

The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung

Brooklyn Journal of Corporate, Financial & Commercial Law

As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible for providing …


Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong May 2018

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Michigan Telecommunications & Technology Law Review

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive copyright protection …


The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon Apr 2018

The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon

The University of Cincinnati Intellectual Property and Computer Law Journal

The exact reach of the Defend Trade Secrets Act’s extraterritoriality provision has yet to be interpreted by the courts. If United States securities, trademark, and antitrust law serves as any indication of what is to be expected, the Defend Trade Secrets Act may be subject to an inconsistent array of interpretation. When faced with interpreting the extraterritorial scope of the Defend Trade Secrets Act for the first time, the court must set a strong precedent by enacting a single, uniform effects test that will not falter when applied in different circumstances and by different circuits. Courts interpreting United States securities, …


Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer Mar 2018

Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer

Duke Law & Technology Review

The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership …


Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan Feb 2018

Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan

University of Massachusetts Law Review

Technology has seen a boom over the last few decades, making innovative leaps that border on science fiction. With the most recent technological leap came a new frontier of intellectual property and birthed a new class of criminal: the cyber-pirate. This Article discusses cyber-piracy and its interactions and implications for modern United States copyright law. The Article explains how copyright law, unprepared for the boom, struggled to adapt as courts reconciled the widely physical perceptions of copyright with the digital information being transferred between billions of users instantaneously. The Article also explores how cyber-piracy has made, and continues to make, …


Front Matter Jan 2018

Front Matter

SMU Science and Technology Law Review

No abstract provided.


The Missing Hyperlink — An Empirical Study: Can Canadian Laws Effectively Protect Consumers Purchasing Online?, Mariella Montplaisir Jan 2018

The Missing Hyperlink — An Empirical Study: Can Canadian Laws Effectively Protect Consumers Purchasing Online?, Mariella Montplaisir

Canadian Journal of Law and Technology

Canadian consumer protection legislation applicable to online transactions generally works by a two-pronged method: first, private international law rules ensure that in most cases, consumers can sue in their home province under that province’s law; and, second, a wide range of substantive obligations are imposed on merchants, and failure to comply with these obligations provides consumers with a right of cancellation. This study considers the private international law rules applicable to online consumer contracts, and discusses the unique jurisdictional challenges presented by online transactions. This study also provides an overview of Canadian legislation applicable to online consumer transactions, and examines …


Social Media Threats: Examining The Canadian Criminal Law Response, Benjamin Perrin Jan 2018

Social Media Threats: Examining The Canadian Criminal Law Response, Benjamin Perrin

Canadian Journal of Law and Technology

This article begins by discussing the legislative history, essential elements, and purpose of the threats offence in s. 264.1(1) of the Criminal Code. It then analyzes major reported Canadian judicial decisions dealing with social media threats, based on the five themes identified above. Finally, this article concludes by highlighting the implications and limitations of this study, as well as areas for future research.


Public Authority Liability And The Regulation Of Nanotechnology: A European Perspective, Nina Natalia Baranowska Jan 2018

Public Authority Liability And The Regulation Of Nanotechnology: A European Perspective, Nina Natalia Baranowska

Canadian Journal of Law and Technology

This paper argues that in certain circumstances public authorities should be liable for regulating nanotechnology. Nanotechnology is an emerging field of technology that enables to control shape and size of various structures, devices and systems at nanometer scale on which one nanometer is equal to one-billionth of a meter. In spite of being a nascent field of science and technology, its scope of application – in the food, pharmaceuticals, cosmetics, construction, textile, electronics, and agricultural industries – is expanding rapidly. The risks associated to nanotechnology, however, and its long-term consequences are still largely unknown, particularly in regards to its health …


Back To The Future: Reviving The Use Of Video Link Evidence In Canadian Criminal Courts, Helena Gluzman Jan 2018

Back To The Future: Reviving The Use Of Video Link Evidence In Canadian Criminal Courts, Helena Gluzman

Canadian Journal of Law and Technology

Section 714.1 of the Criminal Code of Canada allows for witnesses and victims to testify remotely via video link, within Canada. The legal test embedded within this provision — “appropriate in all the circumstances” — has led to inconsistent application across the country. Some jurists have embraced the flexibility provided by the video link process. Others have expressed reluctance, articulating the position that in-court testimony is to be preferred and permitting the use of video link evidence only in exceptional circumstances. R. v. S.D.L. is the first treatment of s. 714.1 by an appellate court. The Nova Scotia Court of …


Front Matter Jan 2018

Front Matter

SMU Science and Technology Law Review

No abstract provided.


Government Surveillance Accountability: The Failures Of Contemporary Canadian Interception Reports, Christopher Parsons, Adam Molnar Jan 2018

Government Surveillance Accountability: The Failures Of Contemporary Canadian Interception Reports, Christopher Parsons, Adam Molnar

Canadian Journal of Law and Technology

Real time electronic government surveillance is recognized as amongst the most intrusive types of government activity upon private citizens’ lives. There are usually stringent warranting practices that must be met prior to law enforcement or security agencies engaging in such domestic surveillance. In Canada, federal and provincial governments must report annually on these practices when they are conducted by law enforcement or the Canadian Security Intelligence Service, disclosing how often such warrants are sought and granted, the types of crimes such surveillance is directed towards, and the efficacy of such surveillance in being used as evidence and securing convictions.

This …


The Aleph Bet: Debating Metaphors For Information, Data Handling And The Right To Be Forgotten, Chris Prince, Micheal Vonn, Lex Gill Jan 2018

The Aleph Bet: Debating Metaphors For Information, Data Handling And The Right To Be Forgotten, Chris Prince, Micheal Vonn, Lex Gill

Canadian Journal of Law and Technology

Court rulings in the European Union (EU) have now established that individuals may seek erasure of personal information posted online. Typically, this involves de-indexing a website from search results, and in some instances the removal of content from primary sources sites. This has, in turn, led to debate around both the logistics and the unintended consequences of removing information online, and subsequent discussions have grappled with a range of images and metaphors to map that new legal reality. This essay surveys that debate, the imagery it employs, and the various logics associated with these metaphors.