Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Computer Law

Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars Nov 2022

Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars

Faculty Scholarship

Many pressing societal questions can be answered only by bringing experts from different disciplines together. Questions around misinformation and disinformation, platform power, surveillance capitalism, information privacy, and algorithmic bias, among many others, reside at the intersection of computer science and law. We need to develop institutions that bring together computer scientists and legal scholars to work together on issues like these, and to train new innovators, thought leaders, counselors, and policymakers with hybrid training in both disciplines. In Universities, the disciplines of Computer Science (CS) and Law are separated by many wide chasms. Differences in standards, language, methods, and culture …


Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon Nov 2022

Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon

Faculty Scholarship

The use of artificial intelligence to help editors examine law review submissions may provide a way to improve an overburdened system. This Article is the first to explore the promise and pitfalls of using artificial intelligence in the law review submissions process. Technology-assisted review of submissions offers many possible benefits. It can simplify preemption checks, prevent plagiarism, detect failure to comply with formatting requirements, and identify missing citations. These efficiencies may allow editors to address serious flaws in the current selection process, including the use of heuristics that may result in discriminatory outcomes and dependence on lower-ranked journals to conduct …


Legislating Data Loyalty, Woodrow Hartzog, Neil Richards Jan 2022

Legislating Data Loyalty, Woodrow Hartzog, Neil Richards

Faculty Scholarship

Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our …


A Unified Theory Of Data, William Magnuson Feb 2021

A Unified Theory Of Data, William Magnuson

Faculty Scholarship

How does the proliferation of data in our modern economy affect our legal system? Scholars that have addressed the question have nearly universally agreed that the dramatic increases in the amount of data available to companies, as well as the new uses to which that data is being put, raise fundamental problems for our regulatory structures. But just what those problems might be remains an area of deep disagreement. Some argue that the problem with data is that current uses lead to discriminatory results that harm minority groups. Some argue that the problem with data is that it impinges on …


Artificial Financial Intelligence, William Magnuson Jul 2020

Artificial Financial Intelligence, William Magnuson

Faculty Scholarship

Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in …


Data Generated By New Technologies And The Law: A Guide For Massachusetts Practitioners, Andrew Sellars Jan 2019

Data Generated By New Technologies And The Law: A Guide For Massachusetts Practitioners, Andrew Sellars

Faculty Scholarship

This brief paper, created as part of a training on new technologies and evidence for MCLE New England, outlines the standards used to compel disclosure of information under the Stored Communication Act, and reviews the types of data stored on various consumer devices and their likely custodians, as well as cases and notes relevant to each devices. The paper serves as a quick introduction and checklist for those considering gathering information from these devices in the course of investigations in Massachusetts. The devices outlined include cell phones, social media platforms, secure messaging services, fitness trackers, home assistant devices (or "smart …


Authors And Machines, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2019

Authors And Machines, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

Machines, by providing the means of mass production of works of authorship, engendered copyright law. Throughout history, the emergence of new technologies tested the concept of authorship, and courts in response endeavored to clarify copyright’s foundational principles. Today, developments in computer science have created a new form of machine, the “artificially intelligent” (AI) system apparently endowed with “computational creativity.” AI systems introduce challenging variations on the perennial question of what makes one an “author” in copyright law: Is the creator of a generative program automatically the author of the works her process begets, even if she cannot anticipate the contents …


Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio Jan 2010

Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio

Faculty Scholarship

No abstract provided.


Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley Jan 2010

Cloud Computing: Storm Warning For Privacy?, Nicole Ozer, Chris Conley

Faculty Scholarship

“Cloud computing” - the ability to create, store, and manipulate data through Web-based services - is growing in popularity. Cloud computing itself may not transform society; for most consumers, it is simply an appealing alternative tool for creating and storing the same records and documents that people have created for years. However, outdated laws and varying corporate practices mean that documents created and stored in the cloud may not have the same protections as the same documents stored in a filing cabinet or on a home computer. Can cloud computing services protect the privacy of their consumers? Do they? And …


Zappers: Tax Fraud, Technology And Terrorist Funding, Richard Thompson Ainsworth Feb 2008

Zappers: Tax Fraud, Technology And Terrorist Funding, Richard Thompson Ainsworth

Faculty Scholarship

"Zappers," or automated sales suppression devices, have brought unheard of efficiencies and economies of scale to a very simple tax fraud - skimming cash sales at point of sale (POS) terminals (electronic cash registers). Until recently the largest tax fraud case in Connecticut, also the "largest computer driven tax-evasion case in the nation," was a zapper case. Stew Leonard's Dairy in Norwalk Connecticut skimmed $17 million in receipts and hid the cash in St. Martin (a Caribbean island). Talal Chahine and his wife, Elfat El Aouar, owners of the La Shish restaurant chain in Detroit Michigan have the dubious honor …


Governing By Negotiation: The Internet Naming System, Tamar Frankel Oct 2004

Governing By Negotiation: The Internet Naming System, Tamar Frankel

Faculty Scholarship

This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …


The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog Jan 2002

The Magic Lantern Revealed: A Report Of The Fbi's New Key Logging Trojan And Analysis Of Its Possible Treatment In A Dynamic Legal Landscape, Woodrow Hartzog

Faculty Scholarship

Magic Lantern presents several difficult legal questions that are left unanswered due to new or non-existent statutes and case law directly pertaining to the unique situation that Magic Lantern creates. 25 The first concern is statutory. It is unclear what laws, if any, will apply when Magic Lantern is put into use.26 The recent terrorist attacks in the United States have brought the need for information as a matter of national security to the forefront. Congress recently passed legislation (i.e. USA PATRIOT Act) 27 that dramatically modifies current surveillance law, thus further complicating the untested waters of a …