Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (10)
- Seattle University School of Law (8)
- Southern Methodist University (8)
- University of Washington School of Law (7)
- Brooklyn Law School (5)
-
- DePaul University (5)
- The Catholic University of America, Columbus School of Law (5)
- American University Washington College of Law (3)
- City University of New York (CUNY) (2)
- Penn State Dickinson Law (2)
- University of Cincinnati College of Law (2)
- Vanderbilt University Law School (2)
- Washington and Lee University School of Law (2)
- Brigham Young University Law School (1)
- California Western School of Law (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Georgetown University Law Center (1)
- Georgia State University College of Law (1)
- Mitchell Hamline School of Law (1)
- Osgoode Hall Law School of York University (1)
- Pepperdine University (1)
- Texas A&M University School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Georgia School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- Keyword
-
- Privacy (11)
- Technology (6)
- AI (3)
- Algorithms (3)
- Blockchain (3)
-
- Cybersecurity (3)
- Artificial Intelligence (2)
- Artificial intelligence (2)
- COVID-19 (2)
- Cryptocurrency (2)
- Data Privacy (2)
- Data privacy (2)
- Disclosure (2)
- Ethics (2)
- FCC (2)
- Fourth Amendment (2)
- Human Rights (2)
- Internet (2)
- Internet service providers (2)
- Legislation (2)
- Machine Learning (2)
- Ransomware (2)
- Security (2)
- Surveillance (2)
- Tech policy (2)
- 2018 BCCA 5 (1)
- 2019 NSSC 370 (1)
- 23andMe (1)
- ADA (1)
- Accessible Websites (1)
- Publication
-
- Canadian Journal of Law and Technology (8)
- SMU Science and Technology Law Review (8)
- Seattle University Law Review (7)
- Washington Journal of Law, Technology & Arts (7)
- Catholic University Journal of Law and Technology (5)
-
- DePaul Journal of Art, Technology & Intellectual Property Law (5)
- Faculty Scholarship (3)
- Articles, Book Chapters, & Popular Press (2)
- Brooklyn Journal of International Law (2)
- Brooklyn Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Joint PIJIP/TLS Research Paper Series (2)
- Open Educational Resources (2)
- The University of Cincinnati Intellectual Property and Computer Law Journal (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles & Book Chapters (1)
- BYU Law Review (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Contributions to Books (1)
- Cornell Law Faculty Publications (1)
- Cybaris® (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Georgia State University Law Review (1)
- Pepperdine Law Review (1)
- Scholarly Works (1)
- Seattle University Law Review Online (1)
- Touro Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Publication Type
Articles 31 - 60 of 75
Full-Text Articles in Computer Law
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi
Brooklyn Journal of Corporate, Financial & Commercial Law
Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …
U.S.-U.K. Executive Agreement: Case Study Of Incidental Collection Of Data Under The Cloud Act, Eddie B. Kim
U.S.-U.K. Executive Agreement: Case Study Of Incidental Collection Of Data Under The Cloud Act, Eddie B. Kim
Washington Journal of Law, Technology & Arts
In March 2018, Congress passed the Clarifying Lawful Overseas Use of Data Act, also known as the CLOUD Act, in order to expedite the process of cross-border data transfers for the purposes of criminal investigations. The U.S. government entered into its first Executive Agreement, the main tool to achieve the goals of the statute, with the United Kingdom in October 2019. While the CLOUD Act requires the U.S. Attorney General to consider whether the foreign government counterpart has a certain level of robust data privacy laws, the relevant laws of the United Kingdom have generally been questioned numerous times for …
Developing Privacy Best Practices For Direct-To-Public Legal Apps: Observations And Lessons Learned, Teresa Scassa, Amy Salyzyn, Jena Mcgill, Suzanne Bouclin
Developing Privacy Best Practices For Direct-To-Public Legal Apps: Observations And Lessons Learned, Teresa Scassa, Amy Salyzyn, Jena Mcgill, Suzanne Bouclin
Canadian Journal of Law and Technology
Canada’s access to justice problem is undeniable. Too many people are unable to get the help they need when they experience legal issues. The reasons underlying this problem are multi-faceted and complex. One major barrier to effectively accessing justice is the cost of legal services; the fees associated with hiring a lawyer are often prohibitive. Increasingly, technology is advanced as a potential solution to the unaffordability of conventional legal services. Courts have tried to create efficiencies by, for example, allowing for e-filing and video- conferenced testimony, where appropriate. For lawyers, new technology products emerge almost daily to help streamline tasks …
Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca
Canadian Journal of Law and Technology
Facial recognition technology is one of the most intrusive and privacy threatening technologies available today. The literature around this technology mainly focuses on its use by the public sector as a mass surveillance tool; however, the private sector uses of facial recognition technologies also raise significant privacy concerns. This paper aims to identify and examine the privacy implications of the private sector uses of facial recognition technologies and the adequacy of Canada’s federal private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA), in addressing these privacy concerns. Facial templates produced and recorded by these technologies are …
Searches Of The Person: A New Approach To Electronic Device Searches At Canadian Customs, Justin Doll
Searches Of The Person: A New Approach To Electronic Device Searches At Canadian Customs, Justin Doll
Canadian Journal of Law and Technology
What goes through your mind at customs? As you wait in that folded line, edging closer to a row of enclosed booths manned by uniformed officers, surrounded by security cameras and warning signs? Perhaps you’re trying to act naturally, then wondering if it shows? Perhaps you’re mentally recalculating the amount you’ve scribbled onto your customs declaration? Or perhaps you’re exhausted from your flight, maybe nursing a bit of a hangover, not thinking about much at all? When you finally get to the front of the line, how do you expect your conversation with the customs officer to go?
According to …
A Better Act, More Bad Behaviour Online: Nova Scotia’S New Intimate Images And Cyber-Protection Act Goes To Court, Jennifer Taylor
A Better Act, More Bad Behaviour Online: Nova Scotia’S New Intimate Images And Cyber-Protection Act Goes To Court, Jennifer Taylor
Canadian Journal of Law and Technology
There is now a reported decision under Nova Scotia’s new Intimate Images and Cyber-protection Act,1 which came into force in July 2018 after the previous legislation, the Cyber-safety Act,2 was struck down as unconstitutional.3
The case, Candelora v. Feser,4 was set against the backdrop of a bitter family law dispute. Dawna Candelora (the Applicant), alleged that her former spouse Trevor Feser and his new partner Sonia Dadas (the Respondents) were cyber- bullying her through an unrelenting stream of negative Facebook posts.
Justice Joshua Arnold of the Supreme Court of Nova Scotia found that the Respondents had engaged in cyber-bullying and …
Case Comment: British Columbia (Attorney General) V. Brecknell, David T. Fraser
Case Comment: British Columbia (Attorney General) V. Brecknell, David T. Fraser
Canadian Journal of Law and Technology
In a day and age where a large portion of both innocent and criminal communications travel across the border and then reside on servers outside of the country, many Canadian police and prosecutors were understandably excited by the British Columbia Court of Appeal’s decision in Brecknell. This case concludes that a Canadian court can order an entity that is only ‘‘virtually present” to produce records pursuant to a Criminal Code production order.
While it is a case that deals with a compelling issue faced by Canadian law enforcement in an environment where hundreds of such orders are issued naming US …
Reflections On The Influence Of Social Media On Judging, Peter D. Lauwers Justice
Reflections On The Influence Of Social Media On Judging, Peter D. Lauwers Justice
Canadian Journal of Law and Technology
This essay examines the influence of social media on judging. While the ethical implications of judges’ engagement in social media have received some scholarly attention, the actual influence of social media on judging has not.1 But it is possible to make some useful observations that might at once seem obvious and disquieting.
This essay is divided into four parts. Part 1 describes the normative judicial disposition. Part 2 examines the psychology of judging. Part 3 asks what could go wrong with the judicial use of social media. Part 4 describes a stance judges might take towards social media.
Book Review: The Long Journey To Software Valuation: Risks And Rewards Ahead By Dwight Olson, Duncan C. Card
Book Review: The Long Journey To Software Valuation: Risks And Rewards Ahead By Dwight Olson, Duncan C. Card
Canadian Journal of Law and Technology
One of the most difficult challenges for any technology start-up, and for its investors, is how to assess the commercial value of their innovative product or service solution. Much-needed guidance on that challenge has finally arrived. Dwight Olson’s The Long Journey To Software Valuation, released on March 1st of this year, provides tremendous assistance for both owners of those assets and all potential investors. In fact, the arrival of Mr. Olson’s book is a relief. As my law practice has been, and remains, devoted to aggressively commercializing technology (including software) for over 25 years, I personally know how welcome …
Harlem Shake Meets The Chevron Two Step: Net Neutrality Following Mozilla V. Fcc, Christopher R. Terry, Scott Memmel
Harlem Shake Meets The Chevron Two Step: Net Neutrality Following Mozilla V. Fcc, Christopher R. Terry, Scott Memmel
Washington Journal of Law, Technology & Arts
In October 2019, the D.C. Circuit handed down its much-anticipated decision in Mozilla v. FCC, relying heavily on Chevron Deference and the Supreme Court’s 2005 Brand X decision. The per curiam opinion upheld large portions of the FCC’s 2018 Restoring Internet Freedom Order, but also undermined the FCC’s preemption of state law while also remanding issues related to public safety, pole attachments, and the Lifeline Program to the agency, assuring that the legal and policy battles over net neutrality will continue. This Article traces the history of the FCC’s efforts on net neutrality as it has moved in and out …
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
The Limits And Possibilities Of Data-Driven Antitrafficking Efforts, Jennifer Musto Ph.D.
Georgia State University Law Review
An examination of technology in the countertrafficking space reveals recurring tensions between law enforcement and rights-based approaches. It also illuminates assumptions, such as the one that posits more law enforcement-focused, nonstate-actor-supported data-driven efforts are necessary to securing justice for people in trafficking situations. However, a closer look at how technology is used and by whom also invites us to ask different questions and to leverage the power of our all-too-human creative potential in thinking about how to value and prioritize data ethics, transparency, and accountability in future countertrafficking work.
The Common Law Of Cyber Trespass, Michael J. O'Connor
The Common Law Of Cyber Trespass, Michael J. O'Connor
Brooklyn Law Review
Right now, if executives in California and Virginia each bribe a competitor’s disloyal employee to steal a trade secret from the competitor’s servers, under the federal Computer Fraud and Abuse Act (CFAA), the Government can charge one executive but not the other. Courts decide these cases differently due to the widening circuit split over the CFAA term “without authorization.” Neither the Supreme Court nor Congress has shown interest in resolving the split over authorization. Even more concerning is the suggestion that they can’t resolve it; the statute addresses too many potential scenarios for a single definition to end all debate. …
Taxation Of Electronic Gaming, Bryan T. Camp
Taxation Of Electronic Gaming, Bryan T. Camp
Washington and Lee Law Review
At a doctrinal level, the subject of this Article is timely. During this time of the coronavirus pandemic, casinos have been closed and large populations have been subject to stay-home orders from local and state authorities. One can reasonably expect a large increase in electronic gaming and thus an increased need for proper consideration of its taxation. This Article argues for a cash-out rule of taxation.
At a deeper level, the subject of this Article is timeless. Tax law is wickedly complex for a reason. This Article explores that complexity using the example of electronic gaming. It grapples with the …
Pseudo-Gambling And Whaling: How Loot Boxes Pray On Vulnerable Populations And How To Curtail Future Predatory Behavior, Alexander Mann
Pseudo-Gambling And Whaling: How Loot Boxes Pray On Vulnerable Populations And How To Curtail Future Predatory Behavior, Alexander Mann
Washington Journal of Law, Technology & Arts
The video game industry has blossomed from a niche hobby into a mainstream cultural industry, outpacing global box office sales in annual revenue. Yet the price of a video game has barely increased since the industry’s inception, and the current standard price point of sixty dollars has survived for over a decade. Competitive market forces drive companies to invest ever more time and money into creating increasingly complex software in order to remain on the cutting edge of graphics and design, while simultaneously increasing revenue. Thus, video game developers and publishers have developed a multitude of alternative money- making services …
How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr
How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr
Catholic University Journal of Law and Technology
In the Disney film Bambi, when the young rabbit Thumper says that Bambi “is kinda wobbly” and “doesn’t walk too good,” Thumper’s mother tells him “if you can’t say something nice, don’t say anything at all.” The Des Moines Register seems to have forgotten Thumper’s Rule when it uncovered Carson King’s teenage tweets and canceled the relationship he had built with Busch Light while raising $3 million for the Stead Family Children’s Hospital. #CancelCulture is a social media phenomenon, where some people use their voices to cancel the platform enjoyed by others. It is the 2019 equivalent of the …
Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves
Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves
Catholic University Journal of Law and Technology
Cyber insurance, which covers a company’s losses and costs stemming from a cyberattack, represents a nearly $5 billion global market. But have stakeholders shaped a sustainable model? This article analyzes contrasting claims about the viability of cyber insurance. It proposes measures to ensure the survival of the cyber insurance market, which should be immediately addressed given the current state of the world and the fact that even pre-COVID-19, businesses worldwide stood to lose over $5.2 trillion over the next five years due to cybercrimes. Unless action is taken to mitigate the fallout from cyber events, the cyber insurance market will …
The Overlapping Web Of Data, Territoriality And Sovereignty, Jennifer Daskal
The Overlapping Web Of Data, Territoriality And Sovereignty, Jennifer Daskal
Contributions to Books
Provides a framework to better understand Global Legal Pluralism and the current international state of law.
Equips practitioners, theorists, and students with deeper insights and analytical tools to describe the conflict among legal and quasi-legal systems.
Analyzes global legal pluralism in light of legal theory, constitutionalism, conflict of laws, international law, commercial transactions, and as it affects indigenous polities, religious orders, and citizenship.
People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke
People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke
Vanderbilt Journal of Entertainment & Technology Law
Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act') imposes conspicuous disclosure requirements …
Quantum Supremacy, Network Security & The Legal Risk Management Framework: Resiliency For National Security Systems, Salah E. Ali
Quantum Supremacy, Network Security & The Legal Risk Management Framework: Resiliency For National Security Systems, Salah E. Ali
SMU Science and Technology Law Review
No abstract provided.
Machines Finding Injustice, Hannah S. Laquer, Ryan W. Copus
Machines Finding Injustice, Hannah S. Laquer, Ryan W. Copus
SMU Science and Technology Law Review
With rising caseloads, review systems are increasingly taxed, stymieing traditional methods of case screening. We propose an automated solution: predictive models of legal decisions can be used to identify and focus review resources on outlier decisions—those decisions that are most likely the product of biases, ideological extremism, unusual moods, and carelessness and thus most at odds with a court’s considered, collective judgment. By using algorithms to find and focus human attention on likely injustices, adjudication systems can largely sidestep the most serious objections to the use of algorithms in the law: that algorithms can embed racial biases, deprive parties of …
Notice And Choice Must Go: The Collective Control Alternative, Richard Warner
Notice And Choice Must Go: The Collective Control Alternative, Richard Warner
SMU Science and Technology Law Review
Over twenty years of criticism conclusively confirm that Notice and Choice results in, as the law professor Fred Cate puts it, “the worst of all worlds: privacy protection is not enhanced, individuals and businesses pay the cost of bureaucratic laws.” So why is it still the dominant legislative and regulatory approach to ensuring adequate informational privacy online? Recent implementations of Notice and Choice include the European Union’s General Data Protection Regulation, and California’s Consumer Protection Privacy Act. There is a well-known alternative (advanced by Helen Nissenbaum and others) that sees informational privacy as arising from social norms that require conformity …
An Old Technology Solves An Old Problem: Rethinking The “World’S Water Battery”, Will Farmer
An Old Technology Solves An Old Problem: Rethinking The “World’S Water Battery”, Will Farmer
SMU Science and Technology Law Review
No abstract provided.
The California Consumer Privacy Act’S Potential Incompatibility With The United States’ Legal And Economic Landscape, Alexandra Henry
The California Consumer Privacy Act’S Potential Incompatibility With The United States’ Legal And Economic Landscape, Alexandra Henry
SMU Science and Technology Law Review
No abstract provided.
Networks Of Empathy, Thomas E. Kadri
Networks Of Empathy, Thomas E. Kadri
Scholarly Works
Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusive conduct like stalking and harassment, manipulating digital tools to control and harm their victims. By some accounts, 95% of domestic-abuse cases involve technology, while a sizeable chunk of the U.S. population now admits to having suffered or perpetrated serious abuse online. To make matters worse, people often trivialize digital abuse or underestimate its prevalence. Even among those who do appreciate its severity, there remains ample disagreement about how to address it.
Although law can be a powerful tool to regulate digital abuse, legal responses are …
National Cybersecurity Innovation, Tabrez Y. Ebrahim
National Cybersecurity Innovation, Tabrez Y. Ebrahim
Faculty Scholarship
National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Provisional Injunctive Relief Under The Utsa And The Dtsa In Federal Court New Product Cases, Richard F. Dole, Jr.
Provisional Injunctive Relief Under The Utsa And The Dtsa In Federal Court New Product Cases, Richard F. Dole, Jr.
SMU Science and Technology Law Review
No abstract provided.