Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2020

Institution
Keyword
Publication
Publication Type

Articles 31 - 60 of 75

Full-Text Articles in Computer Law

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


Masthead Jun 2020

Masthead

Washington Journal of Law, Technology & Arts

No abstract provided.


U.S.-U.K. Executive Agreement: Case Study Of Incidental Collection Of Data Under The Cloud Act, Eddie B. Kim Jun 2020

U.S.-U.K. Executive Agreement: Case Study Of Incidental Collection Of Data Under The Cloud Act, Eddie B. Kim

Washington Journal of Law, Technology & Arts

In March 2018, Congress passed the Clarifying Lawful Overseas Use of Data Act, also known as the CLOUD Act, in order to expedite the process of cross-border data transfers for the purposes of criminal investigations. The U.S. government entered into its first Executive Agreement, the main tool to achieve the goals of the statute, with the United Kingdom in October 2019. While the CLOUD Act requires the U.S. Attorney General to consider whether the foreign government counterpart has a certain level of robust data privacy laws, the relevant laws of the United Kingdom have generally been questioned numerous times for …


Developing Privacy Best Practices For Direct-To-Public Legal Apps: Observations And Lessons Learned, Teresa Scassa, Amy Salyzyn, Jena Mcgill, Suzanne Bouclin Jun 2020

Developing Privacy Best Practices For Direct-To-Public Legal Apps: Observations And Lessons Learned, Teresa Scassa, Amy Salyzyn, Jena Mcgill, Suzanne Bouclin

Canadian Journal of Law and Technology

Canada’s access to justice problem is undeniable. Too many people are unable to get the help they need when they experience legal issues. The reasons underlying this problem are multi-faceted and complex. One major barrier to effectively accessing justice is the cost of legal services; the fees associated with hiring a lawyer are often prohibitive. Increasingly, technology is advanced as a potential solution to the unaffordability of conventional legal services. Courts have tried to create efficiencies by, for example, allowing for e-filing and video- conferenced testimony, where appropriate. For lawyers, new technology products emerge almost daily to help streamline tasks …


Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca Jun 2020

Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca

Canadian Journal of Law and Technology

Facial recognition technology is one of the most intrusive and privacy threatening technologies available today. The literature around this technology mainly focuses on its use by the public sector as a mass surveillance tool; however, the private sector uses of facial recognition technologies also raise significant privacy concerns. This paper aims to identify and examine the privacy implications of the private sector uses of facial recognition technologies and the adequacy of Canada’s federal private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA), in addressing these privacy concerns. Facial templates produced and recorded by these technologies are …


Searches Of The Person: A New Approach To Electronic Device Searches At Canadian Customs, Justin Doll Jun 2020

Searches Of The Person: A New Approach To Electronic Device Searches At Canadian Customs, Justin Doll

Canadian Journal of Law and Technology

What goes through your mind at customs? As you wait in that folded line, edging closer to a row of enclosed booths manned by uniformed officers, surrounded by security cameras and warning signs? Perhaps you’re trying to act naturally, then wondering if it shows? Perhaps you’re mentally recalculating the amount you’ve scribbled onto your customs declaration? Or perhaps you’re exhausted from your flight, maybe nursing a bit of a hangover, not thinking about much at all? When you finally get to the front of the line, how do you expect your conversation with the customs officer to go?

According to …


A Better Act, More Bad Behaviour Online: Nova Scotia’S New Intimate Images And Cyber-Protection Act Goes To Court, Jennifer Taylor Jun 2020

A Better Act, More Bad Behaviour Online: Nova Scotia’S New Intimate Images And Cyber-Protection Act Goes To Court, Jennifer Taylor

Canadian Journal of Law and Technology

There is now a reported decision under Nova Scotia’s new Intimate Images and Cyber-protection Act,1 which came into force in July 2018 after the previous legislation, the Cyber-safety Act,2 was struck down as unconstitutional.3

The case, Candelora v. Feser,4 was set against the backdrop of a bitter family law dispute. Dawna Candelora (the Applicant), alleged that her former spouse Trevor Feser and his new partner Sonia Dadas (the Respondents) were cyber- bullying her through an unrelenting stream of negative Facebook posts.

Justice Joshua Arnold of the Supreme Court of Nova Scotia found that the Respondents had engaged in cyber-bullying and …


Case Comment: British Columbia (Attorney General) V. Brecknell, David T. Fraser Jun 2020

Case Comment: British Columbia (Attorney General) V. Brecknell, David T. Fraser

Canadian Journal of Law and Technology

In a day and age where a large portion of both innocent and criminal communications travel across the border and then reside on servers outside of the country, many Canadian police and prosecutors were understandably excited by the British Columbia Court of Appeal’s decision in Brecknell. This case concludes that a Canadian court can order an entity that is only ‘‘virtually present” to produce records pursuant to a Criminal Code production order.

While it is a case that deals with a compelling issue faced by Canadian law enforcement in an environment where hundreds of such orders are issued naming US …


Reflections On The Influence Of Social Media On Judging, Peter D. Lauwers Justice Jun 2020

Reflections On The Influence Of Social Media On Judging, Peter D. Lauwers Justice

Canadian Journal of Law and Technology

This essay examines the influence of social media on judging. While the ethical implications of judges’ engagement in social media have received some scholarly attention, the actual influence of social media on judging has not.1 But it is possible to make some useful observations that might at once seem obvious and disquieting.

This essay is divided into four parts. Part 1 describes the normative judicial disposition. Part 2 examines the psychology of judging. Part 3 asks what could go wrong with the judicial use of social media. Part 4 describes a stance judges might take towards social media.


Table Of Contents Jun 2020

Table Of Contents

Washington Journal of Law, Technology & Arts

No abstract provided.


Book Review: The Long Journey To Software Valuation: Risks And Rewards Ahead By Dwight Olson, Duncan C. Card Jun 2020

Book Review: The Long Journey To Software Valuation: Risks And Rewards Ahead By Dwight Olson, Duncan C. Card

Canadian Journal of Law and Technology

One of the most difficult challenges for any technology start-up, and for its investors, is how to assess the commercial value of their innovative product or service solution. Much-needed guidance on that challenge has finally arrived. Dwight Olson’s The Long Journey To Software Valuation, released on March 1st of this year, provides tremendous assistance for both owners of those assets and all potential investors. In fact, the arrival of Mr. Olson’s book is a relief. As my law practice has been, and remains, devoted to aggressively commercializing technology (including software) for over 25 years, I personally know how welcome …


Harlem Shake Meets The Chevron Two Step: Net Neutrality Following Mozilla V. Fcc, Christopher R. Terry, Scott Memmel Jun 2020

Harlem Shake Meets The Chevron Two Step: Net Neutrality Following Mozilla V. Fcc, Christopher R. Terry, Scott Memmel

Washington Journal of Law, Technology & Arts

In October 2019, the D.C. Circuit handed down its much-anticipated decision in Mozilla v. FCC, relying heavily on Chevron Deference and the Supreme Court’s 2005 Brand X decision. The per curiam opinion upheld large portions of the FCC’s 2018 Restoring Internet Freedom Order, but also undermined the FCC’s preemption of state law while also remanding issues related to public safety, pole attachments, and the Lifeline Program to the agency, assuring that the legal and policy battles over net neutrality will continue. This Article traces the history of the FCC’s efforts on net neutrality as it has moved in and out …


The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D. May 2020

The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.

Georgia State University Law Review

An examination of technology in the countertrafficking space reveals recurring tensions between law enforcement and rights-based approaches. It also illuminates assumptions, such as the one that posits more law enforcement-focused, nonstate-actor-supported data-driven efforts are necessary to securing justice for people in trafficking situations. However, a closer look at how technology is used and by whom also invites us to ask different questions and to leverage the power of our all-too-human creative potential in thinking about how to value and prioritize data ethics, transparency, and accountability in future countertrafficking work.


The Common Law Of Cyber Trespass, Michael J. O'Connor Apr 2020

The Common Law Of Cyber Trespass, Michael J. O'Connor

Brooklyn Law Review

Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …


Taxation Of Electronic Gaming, Bryan T. Camp Apr 2020

Taxation Of Electronic Gaming, Bryan T. Camp

Washington and Lee Law Review

At a doctrinal level, the subject of this Article is timely. During this time of the coronavirus pandemic, casinos have been closed and large populations have been subject to stay-home orders from local and state authorities. One can reasonably expect a large increase in electronic gaming and thus an increased need for proper consideration of its taxation. This Article argues for a cash-out rule of taxation.

At a deeper level, the subject of this Article is timeless. Tax law is wickedly complex for a reason. This Article explores that complexity using the example of electronic gaming. It grapples with the …


Pseudo-Gambling And Whaling: How Loot Boxes Pray On Vulnerable Populations And How To Curtail Future Predatory Behavior, Alexander Mann Apr 2020

Pseudo-Gambling And Whaling: How Loot Boxes Pray On Vulnerable Populations And How To Curtail Future Predatory Behavior, Alexander Mann

Washington Journal of Law, Technology & Arts

The video game industry has blossomed from a niche hobby into a mainstream cultural industry, outpacing global box office sales in annual revenue. Yet the price of a video game has barely increased since the industry’s inception, and the current standard price point of sixty dollars has survived for over a decade. Competitive market forces drive companies to invest ever more time and money into creating increasingly complex software in order to remain on the cutting edge of graphics and design, while simultaneously increasing revenue. Thus, video game developers and publishers have developed a multitude of alternative money- making services …


How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr Jan 2020

How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr

Catholic University Journal of Law and Technology

In the Disney film Bambi, when the young rabbit Thumper says that Bambi “is kinda wobbly” and “doesn’t walk too good,” Thumper’s mother tells him “if you can’t say something nice, don’t say anything at all.” The Des Moines Register seems to have forgotten Thumper’s Rule when it uncovered Carson King’s teenage tweets and canceled the relationship he had built with Busch Light while raising $3 million for the Stead Family Children’s Hospital. #CancelCulture is a social media phenomenon, where some people use their voices to cancel the platform enjoyed by others. It is the 2019 equivalent of the …


Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves Jan 2020

Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves

Catholic University Journal of Law and Technology

Cyber insurance, which covers a company’s losses and costs stemming from a cyberattack, represents a nearly $5 billion global market. But have stakeholders shaped a sustainable model? This article analyzes contrasting claims about the viability of cyber insurance. It proposes measures to ensure the survival of the cyber insurance market, which should be immediately addressed given the current state of the world and the fact that even pre-COVID-19, businesses worldwide stood to lose over $5.2 trillion over the next five years due to cybercrimes. Unless action is taken to mitigate the fallout from cyber events, the cyber insurance market will …


The Overlapping Web Of Data, Territoriality And Sovereignty, Jennifer Daskal Jan 2020

The Overlapping Web Of Data, Territoriality And Sovereignty, Jennifer Daskal

Contributions to Books

Provides a framework to better understand Global Legal Pluralism and the current international state of law.


Equips practitioners, theorists, and students with deeper insights and analytical tools to describe the conflict among legal and quasi-legal systems.

Analyzes global legal pluralism in light of legal theory, constitutionalism, conflict of laws, international law, commercial transactions, and as it affects indigenous polities, religious orders, and citizenship.


People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke Jan 2020

People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke

Vanderbilt Journal of Entertainment & Technology Law

Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act') imposes conspicuous disclosure requirements …


Front Matter Jan 2020

Front Matter

SMU Science and Technology Law Review

No abstract provided.


Quantum Supremacy, Network Security & The Legal Risk Management Framework: Resiliency For National Security Systems, Salah E. Ali Jan 2020

Quantum Supremacy, Network Security & The Legal Risk Management Framework: Resiliency For National Security Systems, Salah E. Ali

SMU Science and Technology Law Review

No abstract provided.


Machines Finding Injustice, Hannah S. Laquer, Ryan W. Copus Jan 2020

Machines Finding Injustice, Hannah S. Laquer, Ryan W. Copus

SMU Science and Technology Law Review

With rising caseloads, review systems are increasingly taxed, stymieing traditional methods of case screening. We propose an automated solution: predictive models of legal decisions can be used to identify and focus review resources on outlier decisions—those decisions that are most likely the product of biases, ideological extremism, unusual moods, and carelessness and thus most at odds with a court’s considered, collective judgment. By using algorithms to find and focus human attention on likely injustices, adjudication systems can largely sidestep the most serious objections to the use of algorithms in the law: that algorithms can embed racial biases, deprive parties of …


Notice And Choice Must Go: The Collective Control Alternative, Richard Warner Jan 2020

Notice And Choice Must Go: The Collective Control Alternative, Richard Warner

SMU Science and Technology Law Review

Over twenty years of criticism conclusively confirm that Notice and Choice results in, as the law professor Fred Cate puts it, “the worst of all worlds: privacy protection is not enhanced, individuals and businesses pay the cost of bureaucratic laws.” So why is it still the dominant legislative and regulatory approach to ensuring adequate informational privacy online? Recent implementations of Notice and Choice include the European Union’s General Data Protection Regulation, and California’s Consumer Protection Privacy Act. There is a well-known alternative (advanced by Helen Nissenbaum and others) that sees informational privacy as arising from social norms that require conformity …


An Old Technology Solves An Old Problem: Rethinking The “World’S Water Battery”, Will Farmer Jan 2020

An Old Technology Solves An Old Problem: Rethinking The “World’S Water Battery”, Will Farmer

SMU Science and Technology Law Review

No abstract provided.


The California Consumer Privacy Act’S Potential Incompatibility With The United States’ Legal And Economic Landscape, Alexandra Henry Jan 2020

The California Consumer Privacy Act’S Potential Incompatibility With The United States’ Legal And Economic Landscape, Alexandra Henry

SMU Science and Technology Law Review

No abstract provided.


Networks Of Empathy, Thomas E. Kadri Jan 2020

Networks Of Empathy, Thomas E. Kadri

Scholarly Works

Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusive conduct like stalking and harassment, manipulating digital tools to control and harm their victims. By some accounts, 95% of domestic-abuse cases involve technology, while a sizeable chunk of the U.S. population now admits to having suffered or perpetrated serious abuse online. To make matters worse, people often trivialize digital abuse or underestimate its prevalence. Even among those who do appreciate its severity, there remains ample disagreement about how to address it.

Although law can be a powerful tool to regulate digital abuse, legal responses are …


National Cybersecurity Innovation, Tabrez Y. Ebrahim Jan 2020

National Cybersecurity Innovation, Tabrez Y. Ebrahim

Faculty Scholarship

National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …


Provisional Injunctive Relief Under The Utsa And The Dtsa In Federal Court New Product Cases, Richard F. Dole, Jr. Jan 2020

Provisional Injunctive Relief Under The Utsa And The Dtsa In Federal Court New Product Cases, Richard F. Dole, Jr.

SMU Science and Technology Law Review

No abstract provided.