Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Computer Law

Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp Mar 2023

Privacy Is Not Dead: Expressively Using Law To Push Back Against Corporate Deregulators And Meaningfully Protect Data Privacy Rights, Alexander F. Krupp

Georgia Law Review

When the European Union’s (EU) General Data Protection Regulation (GDPR) passed in 2016, it represented the world’s first major comprehensive data privacy law and kicked off a conversation about how we think about the right to privacy in the modern age. The law granted a broad range of rights to EU citizens, including a right to have companies delete data they collect about you, a right not to have your personal information sold, and a range of other rights all geared towards individual autonomy over personal data. All the while, platform companies like Facebook (Meta), Apple, and Amazon have taken …


The Double-Side Of Deepfakes: Obstacles And Assets In The Fight Against Child Pornography, Abigail Olson Jan 2022

The Double-Side Of Deepfakes: Obstacles And Assets In The Fight Against Child Pornography, Abigail Olson

Georgia Law Review

Deepfake technology recently took the internet by storm. Although they can be used for both innocuous and nefarious purposes, deepfakes overwhelmingly depict people who appear to be creating nonconsensual pornography. The rise of deepfake technology must be accounted for in the existing federal legal framework, specifically in cases implicating images of children. While deepfakes’ malicious uses ought to be criminalized, exceptions should be made to use deepfake technology as a tool to enforce and deter purveyors of child pornography. This Note explores what the emerging legal framework addressing deepfakes should look like and considers the importance of using the “flipside” …


Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll Jan 2022

Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll

Georgia Law Review

The Fourth Amendment of the U.S. Constitution protects people “against unreasonable searches and seizures.” The private search doctrine provides a notable exception to the Fourth Amendment, providing that the government may reconstruct a search previously performed by a private party without first obtaining a warrant. The U.S. Supreme Court developed the private search doctrine prior to the advent of the internet; however, modern technology has changed the way that individuals live. What was once done entirely in private is now done alongside ever-present third parties, such as cell phones and virtual assistants.

Facebook and other social media sites complicate Fourth …


The Code Of The Platform, Todd Haugh, Abbey Stemler, Joshua E. Perry Jan 2020

The Code Of The Platform, Todd Haugh, Abbey Stemler, Joshua E. Perry

Georgia Law Review

Digital platform-based businesses such as Uber,
eBay, and Google have become ubiquitous in our daily
lives. They have done so by expertly harnessing
technology to bring supply- and demand-side users
together for commercial and social exchange. Users are
happy to let these platform companies play
“matchmaker” because transaction costs are lowered—it
is easier to find or give a ride, buy or sell a product, or
obtain almost any kind of information than ever before—
and platforms are happy to be at the center of the
exchange, taking advantage of network effects to become
wildly successful. Despite the success of these …


The Four Horsemen Of The Internet Apocalypse: The Relevation Of State Net Neutrality Laws, Zachary P.T. Lundgren Jan 2020

The Four Horsemen Of The Internet Apocalypse: The Relevation Of State Net Neutrality Laws, Zachary P.T. Lundgren

Georgia Law Review

In 2018, on the heels of intense debate and
widespread media campaigns, the FCC repealed its
2015 regulations protecting net neutrality. The repeal
continued to stoke controversy after it was announced,
facing congressional and legal challenges almost
immediately. The most interesting response, however,
has been the passage of state net neutrality laws in
California, Oregon, Vermont, and Washington. The first
of their kind, these four laws largely purport to reinstate
the 2015 net neutrality rules within state lines.
Rather than take sides in the net neutrality debate,
this Note focuses on these novel state laws and,
principally, whether they will …


What The Hack?! Reexamining The Duty Of Oversight In An Age Of Data Breaches, Amanda M. Payne Jan 2019

What The Hack?! Reexamining The Duty Of Oversight In An Age Of Data Breaches, Amanda M. Payne

Georgia Law Review

Due to the proliferation of electronic data and
advancements in technology, data breaches have become
commonplace. Data breaches are a threat to
corporations of all sizes and can have devastating
impacts. Focusing solely on Delaware law, this Note
explores how doctrines such as the business judgment
rule, exculpation provisions, and heightened pleading
standards have left shareholders with limited recourse
in holding directors liable for the catastrophic
consequences of data breaches. Recognizing that
shareholders have been unsuccessful alleging
Caremark-type claims arising out of a data breach, this
Note argues that the expansion of bad faith in Walt
Disney provides alternative ground …


Perfecting Bitcoin, Kevin V. Tu Jan 2018

Perfecting Bitcoin, Kevin V. Tu

Georgia Law Review

Bitcoin is still here. The price of Bitcoin rebounded-
setting a record high of $19,783.21 per Bitcoin in
December 2017 before dropping to a price of $8,690 per
Bitcoin as of March 22, 2018. Moreover, legal and
regulatory developments, like New York's BitLicense and
federal taxation of virtual currency as property, can be
viewed as legitimizing its use. The normalization of
virtual currency is evidenced by its increasingly
mainstream applications. Virtual currency can be used
as a faster and lower cost method of transferringfunds
domestically and internationally. A growing number of
retailers now accept virtual currency as a method of …


All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick Jan 2016

All Blogs Go To Heaven: Preserving Valuable Digital Assets Without The Uniform Fiduciary Access To Digital Assets Act's Removal Of Third Party Privacy Protections, Elizabeth D. Barwick

Georgia Law Review

In the age of the Internet, most of us live our lives largely online. As such, one would expect a concomitant increase in concern for privacy, but this is not necessarily the case. It seems that the instantaneous and anonymous nature of the Internet has given rise to thoughtless sharing that simply did not exist when it was necessary to put pen to paper. Understanding that a great deal of our day-to-day activities are now carried out over the Internet, it makes sense that our families and heirs would want or need access to our accounts in the event of …


Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael Jan 2016

Cybersecurity On My Mind: Protecting Georgia Consumers From Data Breaches, Maggie L. Mcmichael

Georgia Law Review

In a world where vast amounts of personal information
are obtained and stored by countless organizations and
businesses in the public and private sector, data breaches,

due to negligence or nefarious hacking, are a far too
common occurrence. The results of a data breach can be
serious and widespread, from public humiliation to
identity theft and national security crises. In an effort to
protect consumers from the potentially devastating effects
of data breaches, the Federal Trade Commission has
begun to take enforcement action against businesses whose
data security practices are alleged to be unfair and
deceptive. Theoretically, states can take …


Managing Cyber Risks, Kristin N. Johnson Jan 2016

Managing Cyber Risks, Kristin N. Johnson

Georgia Law Review

Cyber risks are as pervasive as the technology that facilitates their execution. The threat of cyber attacks or plots to deploy cyber weapons against critical government entities, private businesses and domestic and international infrastructure resources creates a most significant risk management concern. Pernicious,perilous and ubiquitous, cyber risks have merged as the newest risk management frontier. While the consequences of cyber attacks against individual financial institutions may be alarming, the interconnectedness of the largest financial institutions in the global economy and their shared dependence on technology render these businesses and the systems that execute their transactions shockingly vulnerable. Because of the …


Personal Property Servitudes On The Internet Of Things, Christina Mulligan Jan 2016

Personal Property Servitudes On The Internet Of Things, Christina Mulligan

Georgia Law Review

Small appliances such as thermostats, watches, jewelry, and eyewear are now being made available with networking capability. These networked objects make up the growing Internet of Things-pieces of personal property that run software and connect to the global Internet. These products are typically governed by terms of service or end-user license agreements that create restrictions on how products can be used or transferred- restrictions which would be unenforceable if the inside of the product consisted of gears rather than processing chips. This Article explores the question of when use and transfer restrictions should be enforceable on networked appliances and other …


Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown Jan 2015

Outsourcing, Data Insourcing, And The Irrelevant Constitution, Kimberly N. Brown

Georgia Law Review

Long before revelations of the National Security Agency's data collection programs grabbed headlines, scholars and the press decried the burgeoning harms to privacy that metadata mining and new surveillance technologies present. Through publicly accessible social media sites, web-tracking technologies, private data mining consolidators, and its own databases, the government is just a mouse click away from a wealth of intimate personal information that was virtually inaccessible only a decade ago. At the heart of the conundrum is the government's ability to source an unprecedented amount of personal data from private third parties. This trail of digital information is being insourced …


Digital Medicine, The Fda, And The First Amendment, Adam Candeub Jan 2015

Digital Medicine, The Fda, And The First Amendment, Adam Candeub

Georgia Law Review

Digital medicine might transform healthcare more fundamentally than the introduction of anesthesia or germ basis theory of disease. Already, tens of thousands of "medical apps" are available for smartphones. These computer applications can measure blood pressure, pulse, lung function, oxygenation level, sugar level, breathing rate and body temperature-and can even diagnose skin cancer, analyze urine, and take an echocardiogram. In fall 2013, the Federal Drug Administration (FDA) asserted regulatory authority over mobile medical applications and other digital medical services, threatening to chill, if not, destroy this innovation. This Article argues that the FDA stands on firm legal ground regulating medical …


Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson Jan 2015

Cyber Risks: Emerging Risk Management Concerns For Financial Institutions, Kristin N. Johnson

Georgia Law Review

Rumors posit that, within the last two years, hackers caused outages, disrupting service for the two largest securities exchanges in the world-the NASDAQ and the New York Stock Exchange.

Disappointingly, regulatory reform is often backward-looking. While regulators toil to implement rules to prevent the last crisis from reocurring, new and more perilous threats evade detection. With increasing frequency, cyberattacks threaten critical infrastructure resources such as nuclear centrifuges, electrical grids, and air defense systems. Cyberattacks pose a burgeoning and underexplored universe of emerging concerns impacting areas as diverse as big-box retail stores, casual-dining chains, online retail auctions, and national security. Even …


Chain-Link Confidentiality, Woodrow Hartzog Jan 2012

Chain-Link Confidentiality, Woodrow Hartzog

Georgia Law Review

Disclosing personal information online often feels like
losing control over one's data forever; but it does not have
to be that way. This Essay proposes a "chain-link
confidentiality" approach to protecting online privacy.
One of the most difficult challenges to guarding privacy in
the digital age is the protection of information once it is
exposed to other people. A chain-link confidentiality
regime would link the disclosure of personal information
to obligations to protect that information as the
information moves downstream. It would focus on the
relationships not only between the discloser of information
and the initial recipient but also between …