Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 70

Full-Text Articles in Computer Law

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast Dec 2020

Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast

Brooklyn Journal of International Law

Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …


How Supreme Court Precedent Sheds Light On Corporate Bill Of Attainder Claims, Alina Veneziano Dec 2020

How Supreme Court Precedent Sheds Light On Corporate Bill Of Attainder Claims, Alina Veneziano

Seattle Journal for Social Justice

No abstract provided.


Human-Machine Teaming And Its Legal And Ethical Implications, Jim Q. Chen, Thomas Wingfield Dec 2020

Human-Machine Teaming And Its Legal And Ethical Implications, Jim Q. Chen, Thomas Wingfield

Military Cyber Affairs

Humans rely on machines in accomplishing missions while machines need humans to make them more intelligent and more powerful. Neither side can go without the other, especially in complex environments when autonomous mode is initiated. Things are becoming more complicated when law and ethical principles should be applied in these complex environments. One of the solutions is human-machine teaming, as it takes advantage of both the best humans can offer and the best that machines can provide. This article intends to explore ways of implementing law and ethical principles in artificial intelligence (AI) systems using human-machine teaming. It examines the …


Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar Dec 2020

Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar

Articles & Book Chapters

This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …


Horizontal Collusions Organized By Uber: Time For A Change In Canada, Thanh Phan Nov 2020

Horizontal Collusions Organized By Uber: Time For A Change In Canada, Thanh Phan

Canadian Journal of Law and Technology

This paper argues that Uber’s ordinary operation should be characterized as organizing horizontal cartels among drivers that not only fix the fares of ride- hailing services using its platform but also allocate customers. Uber-led cartels, therefore, violate section 45(1) of the Competition Act5 of Canada. In doing so, this paper analyzes the relationships between Uber and drivers and argues that (i) Uber is the organizer of price-fixing and market allocation collusions among drivers, (ii) the collusions are horizontal, and (iii) they are per se illegal.

The first section discusses the general structure of peer-to-peer markets. The second section examines factors …


Richard Susskind, Online Courts And The Future Of Justice (Oxford: Oxford University Press, 2019), David Cowan Nov 2020

Richard Susskind, Online Courts And The Future Of Justice (Oxford: Oxford University Press, 2019), David Cowan

Canadian Journal of Law and Technology

There are times when the essential nature of something is simply viewed as ‘nice to have’ until a paradigmatic shift turns the essential into a necessity, and necessity in technological change is not so much the mother of invention as the parent of behavioural change. This point is made clear by the Covid-19 pandemic, which has forced courts to put online and remote working at centre stage. There is a natural yearning to go back to ‘normal,’ but questions arise as to whether online courts are a good idea and whether attempts to work online and remotely will survive the …


Enough Is As Good As A Feast, Noah C. Chauvin Oct 2020

Enough Is As Good As A Feast, Noah C. Chauvin

Seattle University Law Review

Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.


Preservation Requests And The Fourth Amendment, Armin Tadayon Oct 2020

Preservation Requests And The Fourth Amendment, Armin Tadayon

Seattle University Law Review

Every day, Facebook, Twitter, Google, Amazon, ridesharing companies, and numerous other service providers copy users’ account information upon receiving a preservation request from the government. These requests are authorized under a relatively obscure subsection of the Stored Communications Act (SCA). The SCA is the federal statute that governs the disclosure of communications stored by third party service providers. Section 2703(f) of this statute authorizes the use of “f” or “preservation” letters, which enable the government to request that a service provider “take all necessary steps to preserve records and other evidence in its possession” while investigators seek valid legal process. …


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer Oct 2020

Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer

Seattle University Law Review Online

No abstract provided.


A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr Oct 2020

A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr

Dickinson Law Review (2017-Present)

Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.

To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …


The Digital Samaritans, Eldar Haber Oct 2020

The Digital Samaritans, Eldar Haber

Washington and Lee Law Review

Bystanderism is becoming largely digital. If being subjected to perilous situations was once reserved almost solely for the physical world, individuals now might witness those in peril digitally from afar via online livestreams. New technological developments in the field of artificial intelligence (AI) might also expand bystanderism to new fields, whereby machines—not just humans—are gradually positioned to better compute their surroundings, thus potentially being capable of reaching a high statistical probability that a perilous situation is currently taking place in their vicinity. This current and future expansion of bystanderism into the digital world forms a rather new type of digital …


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Table Of Contents, Seattle University Law Review Sep 2020

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Testimony Of Joshua D. Sarnoff Senate Judiciary Committee, Ip Subcommittee June 4, 2019, Joshua D. Sarnoff Jul 2020

Testimony Of Joshua D. Sarnoff Senate Judiciary Committee, Ip Subcommittee June 4, 2019, Joshua D. Sarnoff

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Regents Of Univ. Of California V. Broad Inst., Inc., 903 F.3d 1286 (Fed. Cir. 2018), Ali Albazzaz Jul 2020

Regents Of Univ. Of California V. Broad Inst., Inc., 903 F.3d 1286 (Fed. Cir. 2018), Ali Albazzaz

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


A Note On Mayo Foundation For Medical Education And Research V. Iancu, Florence Montarmani Jul 2020

A Note On Mayo Foundation For Medical Education And Research V. Iancu, Florence Montarmani

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


What's Going On With Copyright Trolls?, Edward Grahovec Jul 2020

What's Going On With Copyright Trolls?, Edward Grahovec

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


The Constitutionality Of The Hear Act: Empowering American Courts To Return Holocaust-Era Artwork And Honor History, Jennifer A. Kreder, Virginia L. Schell Jul 2020

The Constitutionality Of The Hear Act: Empowering American Courts To Return Holocaust-Era Artwork And Honor History, Jennifer A. Kreder, Virginia L. Schell

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Should Judges Have A Duty Of Tech Competence?, John G. Browning Jul 2020

Should Judges Have A Duty Of Tech Competence?, John G. Browning

St. Mary's Journal on Legal Malpractice & Ethics

In an era in which lawyers are increasingly held to a higher standard of “tech competence” in their representation of clients, shouldn’t we similarly require judges to be conversant in relevant technology? Using real world examples of judicial missteps with or refusal to use technology, and drawn from actual cases and judicial disciplinary proceedings, this Article argues that in today’s Digital Age, judicial technological competence is necessary. At a time when courts themselves have proven vulnerable to cyberattacks, and when courts routinely tackle technology related issues like data privacy and the admissibility of digital evidence, Luddite judges are relics that …


Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi Jun 2020

Saving Small Business From The Big Impact Of Data Breach: A Tiered Federal Approach To Data Protection Law, Nadia Udeshi

Brooklyn Journal of Corporate, Financial & Commercial Law

Small businesses provide a significant positive impact on the American economy. However, the current fragmented federal and state data protection and breach notification legal scheme puts the viability of small businesses at risk. While the probability of data breaches occurring continues to increase, small businesses lack the financial and technological resources to contend with the various state and federal laws that impose different monetary penalties and remedial requirements in the event of such breaches. To preserve the viability of small businesses, Congress should enact a centralized, multi-tiered federal data protection and breach notification framework that preempts state laws, imposes minimum …


The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness Jun 2020

The Criminal, Regulatory, And Civil Issues Surrounding Intellectual Property And Cybersecurity, Ernest Edward Badway, Christie Mcguinness

Brooklyn Journal of Corporate, Financial & Commercial Law

Cyber-attacks have affected all organizations and individual consumers. Dissemination of relevant information and attention to strong information security practices is an important tool in fighting this cyber “pandemic.” Additionally, the legal and regulatory liability companies face from cyber-attacks as well as general strategies and practical solutions companies may implement to protect against cyber-intrusions and respond effectively in the event of an attack are considered. There are many iterations of cyber-crime, and we address the various methods cybercriminals use and the many ways cyber-attacks can take place, as well as the entities and victims affected. Moreover, the legal liability and regulatory …


The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell Jun 2020

The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell

All Faculty Scholarship

Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Prods., Inc. v. McDonald’s Corp., ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonaldland characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding software …


Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Jun 2020

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


Developing Privacy Best Practices For Direct-To-Public Legal Apps: Observations And Lessons Learned, Teresa Scassa, Amy Salyzyn, Jena Mcgill, Suzanne Bouclin Jun 2020

Developing Privacy Best Practices For Direct-To-Public Legal Apps: Observations And Lessons Learned, Teresa Scassa, Amy Salyzyn, Jena Mcgill, Suzanne Bouclin

Canadian Journal of Law and Technology

Canada’s access to justice problem is undeniable. Too many people are unable to get the help they need when they experience legal issues. The reasons underlying this problem are multi-faceted and complex. One major barrier to effectively accessing justice is the cost of legal services; the fees associated with hiring a lawyer are often prohibitive. Increasingly, technology is advanced as a potential solution to the unaffordability of conventional legal services. Courts have tried to create efficiencies by, for example, allowing for e-filing and video- conferenced testimony, where appropriate. For lawyers, new technology products emerge almost daily to help streamline tasks …


Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca Jun 2020

Can Pipeda ‘Face’ The Challenge? An Analysis Of The Adequacy Of Canada’S Private Sector Privacy Legislation Against Facial Recognition Technology, Tunca Bolca

Canadian Journal of Law and Technology

Facial recognition technology is one of the most intrusive and privacy threatening technologies available today. The literature around this technology mainly focuses on its use by the public sector as a mass surveillance tool; however, the private sector uses of facial recognition technologies also raise significant privacy concerns. This paper aims to identify and examine the privacy implications of the private sector uses of facial recognition technologies and the adequacy of Canada’s federal private sector privacy legislation, the Personal Information Protection and Electronic Documents Act (PIPEDA), in addressing these privacy concerns. Facial templates produced and recorded by these technologies are …


Searches Of The Person: A New Approach To Electronic Device Searches At Canadian Customs, Justin Doll Jun 2020

Searches Of The Person: A New Approach To Electronic Device Searches At Canadian Customs, Justin Doll

Canadian Journal of Law and Technology

What goes through your mind at customs? As you wait in that folded line, edging closer to a row of enclosed booths manned by uniformed officers, surrounded by security cameras and warning signs? Perhaps you’re trying to act naturally, then wondering if it shows? Perhaps you’re mentally recalculating the amount you’ve scribbled onto your customs declaration? Or perhaps you’re exhausted from your flight, maybe nursing a bit of a hangover, not thinking about much at all? When you finally get to the front of the line, how do you expect your conversation with the customs officer to go?

According to …