Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (10)
- Seattle University School of Law (8)
- Southern Methodist University (8)
- University of Washington School of Law (7)
- Brooklyn Law School (5)
-
- DePaul University (5)
- The Catholic University of America, Columbus School of Law (5)
- American University Washington College of Law (3)
- City University of New York (CUNY) (2)
- Penn State Dickinson Law (2)
- University of Cincinnati College of Law (2)
- Vanderbilt University Law School (2)
- Washington and Lee University School of Law (2)
- Brigham Young University Law School (1)
- California Western School of Law (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Georgetown University Law Center (1)
- Georgia State University College of Law (1)
- Mitchell Hamline School of Law (1)
- Osgoode Hall Law School of York University (1)
- Pepperdine University (1)
- Texas A&M University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Georgia School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- Keyword
-
- Privacy (11)
- Technology (6)
- AI (3)
- Algorithms (3)
- Blockchain (3)
-
- Cybersecurity (3)
- Artificial Intelligence (2)
- Artificial intelligence (2)
- COVID-19 (2)
- Cryptocurrency (2)
- Data Privacy (2)
- Data privacy (2)
- Disclosure (2)
- Ethics (2)
- FCC (2)
- Fourth Amendment (2)
- Human Rights (2)
- Internet (2)
- Internet service providers (2)
- Legislation (2)
- Machine Learning (2)
- Ransomware (2)
- Security (2)
- Surveillance (2)
- Tech policy (2)
- 2018 BCCA 5 (1)
- 2019 NSSC 370 (1)
- 23andMe (1)
- ADA (1)
- Accessible Websites (1)
- Publication
-
- Canadian Journal of Law and Technology (8)
- SMU Science and Technology Law Review (8)
- Seattle University Law Review (7)
- Washington Journal of Law, Technology & Arts (7)
- Catholic University Journal of Law and Technology (5)
-
- DePaul Journal of Art, Technology & Intellectual Property Law (5)
- Faculty Scholarship (3)
- Articles, Book Chapters, & Popular Press (2)
- Brooklyn Journal of International Law (2)
- Brooklyn Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Joint PIJIP/TLS Research Paper Series (2)
- Open Educational Resources (2)
- The University of Cincinnati Intellectual Property and Computer Law Journal (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles & Book Chapters (1)
- BYU Law Review (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Contributions to Books (1)
- Cornell Law Faculty Publications (1)
- Cybaris® (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Georgia State University Law Review (1)
- Pepperdine Law Review (1)
- Scholarly Works (1)
- Seattle University Law Review SUpra (1)
- Touro Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Publication Type
Articles 1 - 30 of 75
Full-Text Articles in Computer Law
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
News Reporting On Trump's Covid-19 Treatments: Should Broadcasters Have To Disclose Their Being Potentially Dangerous?, Dr. Joel Timmer
News Reporting On Trump's Covid-19 Treatments: Should Broadcasters Have To Disclose Their Being Potentially Dangerous?, Dr. Joel Timmer
Washington Journal of Law, Technology & Arts
During the early months of the COVID-19 pandemic in 2020, President Trump touted a number of treatments that many medical professionals considered dangerous. These treatments include hydroxychloroquine and disinfectants, which if misused could cause a patient’s death. This prompted Free Press to file an emergency petition with the FCC, arguing that broadcasters who report on Trump’s claims about these treatments without highlighting their dangers could be in violation of the Commission’s broadcast hoax rule. Free Press also requested the FCC require that broadcasters include disclaimers when reporting on such claims. This article examines whether the broadcast hoax rule has been …
Information Crossroads: Intersection Of Military And Civilian Interpretations Of Cyber Attack And Defense, Carlos Plazas
Information Crossroads: Intersection Of Military And Civilian Interpretations Of Cyber Attack And Defense, Carlos Plazas
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar
Articles & Book Chapters
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Can David Really Beat Goliath? A Look Into The Anti-Competitive Restrictions Of Apple Inc. And Google, Llc, Emily Feeley
Can David Really Beat Goliath? A Look Into The Anti-Competitive Restrictions Of Apple Inc. And Google, Llc, Emily Feeley
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Articles
This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …
Richard Susskind, Online Courts And The Future Of Justice (Oxford: Oxford University Press, 2019), David Cowan
Richard Susskind, Online Courts And The Future Of Justice (Oxford: Oxford University Press, 2019), David Cowan
Canadian Journal of Law and Technology
There are times when the essential nature of something is simply viewed as ‘nice to have’ until a paradigmatic shift turns the essential into a necessity, and necessity in technological change is not so much the mother of invention as the parent of behavioural change. This point is made clear by the Covid-19 pandemic, which has forced courts to put online and remote working at centre stage. There is a natural yearning to go back to ‘normal,’ but questions arise as to whether online courts are a good idea and whether attempts to work online and remotely will survive the …
Preservation Requests And The Fourth Amendment, Armin Tadayon
Preservation Requests And The Fourth Amendment, Armin Tadayon
Seattle University Law Review
Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …
Enough Is As Good As A Feast, Noah C. Chauvin
Enough Is As Good As A Feast, Noah C. Chauvin
Seattle University Law Review
Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer
Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer
Seattle University Law Review SUpra
No abstract provided.
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Washington and Lee Journal of Civil Rights and Social Justice
You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.
Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.
Accordingly, the United States government has been …
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …
Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
BYU Law Review
Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.
Traditional privacy pillars such as the home and secrecy of communications do …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …
Testimony Of Joshua D. Sarnoff Senate Judiciary Committee, Ip Subcommittee June 4, 2019, Joshua D. Sarnoff
Testimony Of Joshua D. Sarnoff Senate Judiciary Committee, Ip Subcommittee June 4, 2019, Joshua D. Sarnoff
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Regents Of Univ. Of California V. Broad Inst., Inc., 903 F.3d 1286 (Fed. Cir. 2018), Ali Albazzaz
Regents Of Univ. Of California V. Broad Inst., Inc., 903 F.3d 1286 (Fed. Cir. 2018), Ali Albazzaz
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Note On Mayo Foundation For Medical Education And Research V. Iancu, Florence Montarmani
A Note On Mayo Foundation For Medical Education And Research V. Iancu, Florence Montarmani
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
What's Going On With Copyright Trolls?, Edward Grahovec
What's Going On With Copyright Trolls?, Edward Grahovec
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
The Constitutionality Of The Hear Act: Empowering American Courts To Return Holocaust-Era Artwork And Honor History, Jennifer A. Kreder, Virginia L. Schell
The Constitutionality Of The Hear Act: Empowering American Courts To Return Holocaust-Era Artwork And Honor History, Jennifer A. Kreder, Virginia L. Schell
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …
Artificial Financial Intelligence, William Magnuson
Artificial Financial Intelligence, William Magnuson
Faculty Scholarship
Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in …
Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier
Debugging Irs Notice 2014-21: Creating A Viable Cryptocurrency Taxation Plan, Alex Ankier
Brooklyn Law Review
In 2014, the Internal Revenue Service (IRS) issued Notice 2014-21 in an attempt to address issues with cryptocurrency taxation, essentially reaching the conclusion that cryptocurrency must be treated like property for purposes of taxation. In the time since the IRS pronouncement, several academics have called for an alternative treatment known as “currency treatment.” Each treatment inadequately addresses the comprehensive issues surrounding cryptocurrency because they offer wholesale treatment to nuanced issues with valid concerns from each side. To truly allow this emerging industry to flourish and gain societal acceptance, artful policymaking is required. This note provides an example of such policymaking. …