Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Northwestern Pritzker School of Law

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 20 of 20

Full-Text Articles in Computer Law

Law Informs Code: A Legal Informatics Approach To Aligning Artificial Intelligence With Humans, John J. Nay Apr 2023

Law Informs Code: A Legal Informatics Approach To Aligning Artificial Intelligence With Humans, John J. Nay

Northwestern Journal of Technology and Intellectual Property

Artificial Intelligence (AI) capabilities are rapidly advancing. Highly capable AI could cause radically different futures depending on how it is developed and deployed. We are unable to specify human goals and societal values in a way that reliably directs AI behavior. Specifying the desirability (value) of AI taking a particular action in a particular state of the world is unwieldy beyond a very limited set of state-action-values. The purpose of machine learning is to train on a subset of states and have the resulting agent generalize an ability to choose high value actions in unencountered circumstances. Inevitably, the function ascribing …


The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar Apr 2023

The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar

Northwestern Journal of Technology and Intellectual Property

Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor …


A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan Apr 2023

A Loaded God Complex: The Unconstitutionality Of The Executive Branch’S Unilaterally Withholding Zero-Days, Brendan Gilligan

Northwestern Journal of Technology and Intellectual Property

No abstract provided.


The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor Nov 2022

The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor

Northwestern Journal of Technology and Intellectual Property

To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …


Beacons: A Viable Solution To The Ever-Evolving Problem Of Corporate Data Breaches, Lauren Fiotakis Apr 2022

Beacons: A Viable Solution To The Ever-Evolving Problem Of Corporate Data Breaches, Lauren Fiotakis

Northwestern Journal of Technology and Intellectual Property

In an increasingly virtual world, data breaches continuously plague large corporations. These companies have few options to keep their data out of the hands of persistent hackers, who often discover ways around any safeguards that may be in place. It seems as though any measures companies are currently able to employ merely delay the inevitable breach that will bring with it the potential loss of both customers’ data and their faith in the privacy and security of their information. These attacks can be debilitating to corporations; thus, it seems only fair to provide them the ability to take active measures …


The Tipping Point – Reevaluating The Asnef-Equifax Separation Of Competition Of Data Privacy Law In The Wake Of The 2017 Equifax Data Breach, Olivia Altmayer Jan 2018

The Tipping Point – Reevaluating The Asnef-Equifax Separation Of Competition Of Data Privacy Law In The Wake Of The 2017 Equifax Data Breach, Olivia Altmayer

Northwestern Journal of International Law & Business

Contrary to the Court of Justice for the European Union’s decision in the Asnef-Equifax case, in a world of big data, it is inefficient and ineffective to treat EU competition law and EU data protection law as entirely separate legal considerations. Reevaluating this stance is critical in sectors where customer data is highly sensitive, and therefore highly valuable to those who steal it, particularly for the financial and healthcare sectors. Looking forward, companies that store and use biometric data will have to be similarly scrutinized. To correct this problem, the EU has numerous paths it can take: (a) continue as …


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Toward A "Digital Transfer Doctrine"? The First Sale Doctrine In The Digital Era, Sarah Reis Mar 2015

Toward A "Digital Transfer Doctrine"? The First Sale Doctrine In The Digital Era, Sarah Reis

Northwestern University Law Review

The first sale doctrine in copyright law allows a person who owns a copy of a copyrighted work to sell, lend, or give away the copy to someone else. An owner of a copy of a copyrighted work can take advantage of the first sale doctrine, but a licensee cannot. In today’s digital environment, people are increasingly purchasing digital music files and e-books instead of CDs and physical books. Customers often mistakenly believe they become owners of the digital content they purchase when in actuality they merely become licensees most of the time. Licensing agreements impose use restrictions on digital …


Of Bitcoins, Independently Wealthy Software, And The Zero-Member Llc, Shawn Bayern Jan 2015

Of Bitcoins, Independently Wealthy Software, And The Zero-Member Llc, Shawn Bayern

Northwestern University Law Review

No abstract provided.


International Cryptography Regulation And The Global Information Economy, Nathan Saper Sep 2013

International Cryptography Regulation And The Global Information Economy, Nathan Saper

Northwestern Journal of Technology and Intellectual Property

With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.

This Note seeks to introduce the reader to the issue of international cryptography regulation …


The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang Sep 2013

The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang

Northwestern Journal of Technology and Intellectual Property

With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …


Check-In, Attendees Of The Symposium Feb 2012

Check-In, Attendees Of The Symposium

NJTIP Annual Symposium

Check-in for the Northwestern Journal of Technology and Intellectual Property's 7th Annual Symposium


Supervising Managed Services, James B. Speta Jan 2011

Supervising Managed Services, James B. Speta

Faculty Working Papers

Many Internet-access providers simultaneously offer Internet access and other services, such as traditional video channels, video on demand, voice calling, and other emerging services, through a single, converged platform. These other services—which can be called "managed services" because the carrier offers them only to its subscribers in a manner designed to ensure some quality of service—in many circumstances will compete with services that are offered by unaffiliated parties as applications or services on the Internet. This situation creates an important interaction effect between the domains of Internet access and managed services, an effect that has largely been missing from the …


Comparison Between U.S. And E.U. Antitrust Treatment Of Tying Claims Against Microsoft: When Should The Bundling Of Computer Software Be Permitted, James F. Ponsoldt, Christohper D. David Jan 2007

Comparison Between U.S. And E.U. Antitrust Treatment Of Tying Claims Against Microsoft: When Should The Bundling Of Computer Software Be Permitted, James F. Ponsoldt, Christohper D. David

Northwestern Journal of International Law & Business

This article will analyze the recent U.S. and E.U. judicial approaches to tying charges which stem from software bundling. Part II reviews U.S. tying jurisprudence both generally and as applied to software bundling. Part III outlines the D.C. Circuit's approach to Microsoft's Windows/Internet Explorer bundle. Part IV briefly covers tying jurisprudence in the European Union. Part V describes the European Commission's ("E.C.") analysis of Microsoft's Window/Windows Media Player bundle. By comparing the two approaches, Part VI shows that neither approach is ideal: although the U.S. approach offers too little guidance to software manufacturers seeking to avoid liability and unduly discounts …


How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos Jan 2002

How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos

Northwestern Journal of International Law & Business

The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …


International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic Jan 2002

International Commercial Arbitration In Cyberspace: Recent Developments, Ljiljana Biukovic

Northwestern Journal of International Law & Business

This article examines some features of virtual arbitration and argues that the use of new technology and the development of e-commerce raise some interesting questions to international arbitration laws. Part It describes initiatives to develop online dispute resolution. Part III discusses virtual dispute resolution centers, including, how, why, and where they function. More importantly, however, Part III investigates the differences between online and off-line arbitration, where the focus remains on three questions. The first question is a crucial one. It has been debated by scholars and practitioners but still remains unresolved: will arbitration agreements concluded online and arbitration awards rendered …


Internet Jurisdiction Today, Adria Allen Jan 2001

Internet Jurisdiction Today, Adria Allen

Northwestern Journal of International Law & Business

This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …


The Proposed E.U. Vat On Electronically Transmitted Services: Enforcement And Compliance Issues, Thomas Fawkes Jan 2001

The Proposed E.U. Vat On Electronically Transmitted Services: Enforcement And Compliance Issues, Thomas Fawkes

Northwestern Journal of International Law & Business

This paper will begin by discussing the current VAT system in the E.U. It will also describe in detail the provisions of the proposed VAT amendments as they affect electronic commerce transactions with respect to both B2B and B2C transactions. Next, the practical effects of the VAT amendments in terms of increased VAT revenue for the E.U. and its mem-ber states will be discussed. Following will be a discussion on the past and present failures of the E.U. and its Member States in encouraging and en-forcing compliance under the current VAT Directive, and the implication of such failures on the …


Transborder Data Flow: Separating The Privacy Interests Of Individuals And Corporations, Garry S. Grossman Jan 1982

Transborder Data Flow: Separating The Privacy Interests Of Individuals And Corporations, Garry S. Grossman

Northwestern Journal of International Law & Business

The merger of computer and communications technologies in the past two decades has revolutionized information processing throughout the world. The most recent telecommunications advances possible direct international transfers of sensitive personal data via computer-satellite links. Computerized data bases containing commercial information identifying citizens of one country are now routinely transferred to and stored in another, often without the knowledge of the individuals identified in the data. Numerous European countries have enacted data protection legislation with the avowed intent to protect their citizens from the improper use of personal information that is transferred extranationally. These data protection laws prohibit the export …


Transborder Data Flow: Problems With The Council Of Europe Convention, Or Protecting States From Protectionism, Jane A. Zimmerman Jan 1982

Transborder Data Flow: Problems With The Council Of Europe Convention, Or Protecting States From Protectionism, Jane A. Zimmerman

Northwestern Journal of International Law & Business

This comment will discuss the current status of national data protection laws and their effect on the conflict between the individual interest in retaining personal privacy and the business interest in preserving the free flow of information. Such discussion will highlight the consequences of the proposed Council of Europe Convention's regulation of personal data. A brief look at the history f the information industry, as well as the costs of and justifications for transborder data flow, will serve to establish a framework for the issues and controversies which the Convention addresses. The comment will also focus on specific proviisons of …