Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Law

How To Interpret The Securities Laws?, Zachary J. Gubler Jan 2024

How To Interpret The Securities Laws?, Zachary J. Gubler

Seattle University Law Review

In discussions of the federal securities laws, the SEC usually gets most of the attention. This makes some sense. After all, it is the agency charged with administrating the securities laws and regulating the industry as a whole. It makes the majority of the laws; it engages in enforcement actions; it reacts to crises; and it, or sometimes even its individual commissioners, intervene publicly in policy debates. Often overlooked in such discussion, however, is the role of the Supreme Court in shaping securities law, and a new book by Adam Pritchard and Robert Thompson demonstrates why this is an oversight. …


A Synthesis Of The Science And Law Relating To Eyewitness Misidentifications And Recommendations For How Police And Courts Can Reduce Wrongful Convictions Based On Them, Henry F. Fradella Jan 2023

A Synthesis Of The Science And Law Relating To Eyewitness Misidentifications And Recommendations For How Police And Courts Can Reduce Wrongful Convictions Based On Them, Henry F. Fradella

Seattle University Law Review

The empirical literature on perception and memory consistently demonstrates the pitfalls of eyewitness identifications. Exoneration data lend external validity to these studies. With the goal of informing law enforcement officers, prosecutors, criminal defense attorneys, judges, and judicial law clerks about what they can do to reduce wrongful convictions based on misidentifications, this Article presents a synthesis of the scientific knowledge relevant to how perception and memory affect the (un)reliability of eyewitness identifications. The Article situates that body of knowledge within the context of leading case law. The Article then summarizes the most current recommendations for how law enforcement personnel should—and …


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini Jul 2015

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may …


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner Jul 2015

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to their …