Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Contracts (33)
- Internet Law (23)
- Intellectual Property Law (19)
- Science and Technology Law (19)
- Commercial Law (13)
-
- Consumer Protection Law (13)
- Comparative and Foreign Law (10)
- Communications Law (9)
- International Law (9)
- Law and Economics (9)
- Banking and Finance Law (8)
- Dispute Resolution and Arbitration (8)
- Constitutional Law (7)
- Entertainment, Arts, and Sports Law (7)
- Antitrust and Trade Regulation (6)
- International Trade Law (6)
- Law and Society (6)
- Public Law and Legal Theory (6)
- Social and Behavioral Sciences (6)
- Business Organizations Law (5)
- Conflict of Laws (5)
- Criminal Law (5)
- Criminal Procedure (5)
- Jurisdiction (5)
- Labor and Employment Law (5)
- Legal Profession (5)
- Legal Writing and Research (5)
- Property Law and Real Estate (5)
- Institution
-
- BLR (9)
- SelectedWorks (7)
- Selected Works (5)
- University of Washington School of Law (4)
- Chicago-Kent College of Law (2)
-
- University of Pennsylvania Carey Law School (2)
- American University Washington College of Law (1)
- Cornell University Law School (1)
- Singapore Management University (1)
- Texas A&M University School of Law (1)
- University of Colorado Law School (1)
- University of New Hampshire (1)
- Washington University in St. Louis (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- ExpressO (9)
- All Faculty Scholarship (4)
- Articles (3)
- Jonathan I. Ezor (2)
- Ran Bi (2)
-
- Rodolfo C. Rivas (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Centre for Computational Law (1)
- Cornell Law Faculty Working Papers (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Hillary A Henderson (1)
- Julian Dibbell (1)
- Law Faculty Scholarship (1)
- Matthew Roach (1)
- Nancy Kim (1)
- Publications (1)
- Richard Warner (1)
- Scholarship@WashULaw (1)
- T. Noble Foster (1)
- Washington Law Review (1)
- Publication Type
- File Type
Articles 1 - 30 of 37
Full-Text Articles in Computer Law
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
Faculty Scholarship
Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …
The New Bailments, Danielle D’Onfro
The New Bailments, Danielle D’Onfro
Washington Law Review
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
The New Bailments, Danielle D'Onfro
The New Bailments, Danielle D'Onfro
Scholarship@WashULaw
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
Towards Cnl-Based Verbalization Of Computational Contracts, Inari Listenmaa, Maryam Hanafiah, Regina Cheong, Andreas Kallberg
Towards Cnl-Based Verbalization Of Computational Contracts, Inari Listenmaa, Maryam Hanafiah, Regina Cheong, Andreas Kallberg
Centre for Computational Law
We present a CNL, which is a component of L4, a domain-specific programming language for drafting laws and contracts. Along with formal verification, L4’s core functionalities include natural language generation. We present the NLG pipeline and an interactive process for ambiguity resolution.
Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman
Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman
All Faculty Scholarship
Deals accomplished through software persistently residing on computer networks—sometimes called smart contracts, but better termed transactional scripts—embody a potentially revolutionary contracting innovation. Ours is the first precise account in the legal literature of how such scripts are created, and when they produce errors of legal significance.
Scripts’ most celebrated use case is for transactions operating exclusively on public, permissionless, blockchains: such exchanges eliminate the need for trusted intermediaries and seem to permit parties to commit ex ante to automated performance. But public transactional scripts are costly both to develop and execute, with significant fees imposed for data storage. Worse, bugs …
Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason
Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason
Faculty Publications
Smart contracts and cryptocurrencies have sparked considerable interest among legal scholars in recent years, and a growing body of scholarship focuses on whether smart contracts and cryptocurrencies can sidestep law and regulation altogether. Bitcoin is famously decentralized, without any central actor controlling the system. Its users remain largely anonymous, using alphanumeric addresses instead of legal names. Ethereum shares these traits and also supports smart contracts that can automate the transfer of the Ethereum cryptocurrency (known as ether). Ethereum also supports specialized "tokens" that can be tied to the ownership of assets, goods, and services that exist completely outside of the …
The Role Of International Rules In Blockchain-Based Cross-Border Commercial Disputes, Tonya M. Evans
The Role Of International Rules In Blockchain-Based Cross-Border Commercial Disputes, Tonya M. Evans
Law Faculty Scholarship
[excerpt] The concept of online dispute resolution (ODR) is not new. 1 But, with the advent of Web 3.0, the distributed web that facilitates pseudonymous and cross-border transactions via blockchain's distributed ledger technology, 2 the idea of, and pressing need for, appropriate dispute resolution models for blockchain-based disputes to support this novel system of distributed consensus and trust of which blockchain proponents boast, is a primary concern in rapid development. 3 The common goal of each project is to utilize smart contracts to facilitate "superior, quicker[,] and less expensive proceedings by eliminating so many of the tedious and protracted trappings …
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Ran Bi
China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.
E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors . Users are easy to become victims of exploitative terms, because their consent has …
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Ran Bi
China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.
E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors1. Users2 are easy to become victims of exploitative terms, because their consent has been …
Toward A New Language Of Legal Drafting, Matthew Roach
Toward A New Language Of Legal Drafting, Matthew Roach
Matthew Roach
Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.
Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell
Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell
Julian Dibbell
When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …
The Software Licensing Dilemma, Nancy S. Kim
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Richard Warner
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
All Faculty Scholarship
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
Lo Que Usted Debe Saber Al Invertir En Una Franquicia En México, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Lo Que Usted Debe Saber Al Invertir En Una Franquicia En México, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors provide a brief account of the increasing importance of franchises in the current economic environment. Furthermore, in this walkthrough the authors discuss the existing legal regime for franchises in Mexico and provide an analysis of the negotiating positions involved in successfully developing a franchise.//////////////////////////////////////////////////////////////////////Los autores proporcionan un breve estudio sobre la creciente importancia de las franquicias en el entorno económico actual. Además, los autores analizan el régimen jurídico vigente para las franquicias en México y ofrecen un análisis sobre las negociaciones necesarias para el desarrollo exitoso de una franquicia.
Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor
Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor
Jonathan I. Ezor
In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …
Computable Contracts, Harry Surden
Computable Contracts, Harry Surden
Publications
This Article explains how and why firms are representing certain contractual obligations as computer data. The reason is so that computers can read and process the substantive aspects of contractual obligations. The representation of contractual obligations in data instead of (or in addition to) the traditional written language form - what this Article calls "data-oriented contracting" - allows for the application of advanced computer processing abilities to substantive contractual obligations. Certain financial contracts exemplify this model. Equity option contracts are routinely represented not as contract documents written in ordinary language - but as data records intended to be processed by …
Enforcement Of Open Source Software Licenses: The Mdy Trio's Inconvenient Compliations, Robert W. Gomulkiewicz
Enforcement Of Open Source Software Licenses: The Mdy Trio's Inconvenient Compliations, Robert W. Gomulkiewicz
Articles
The Federal Circuit’s ruling in Jacobsen v. Katzer [535 F.3d 1373 (Fed. Cir. 2008)] finally settled the question of whether open source licenses are enforceable. Unfortunately, three recent cases from the Ninth Circuit have complicated matters. I call this trio of cases the “MDY Trio” in honor of the Ninth Circuit’s prior trio of licensing cases known as the “MAI Trio.”
On the surface, the MDY Trio provides a boost for the enforceability of software licenses, but the MDY Trio also creates two significant complications for open source licenses. First, the MDY Trio’s test for distinguishing between licenses and copyright …
Candados Negociales En El Modelo De Franquicia, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Candados Negociales En El Modelo De Franquicia, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss different legal mechanisms to franchise your business successfully while minimizing legal risks.//////////////////////////////////////Los autores analizan los diferentes mecanismos legales para desarrollar una franquicia con éxito y reducir al mínimo los riesgos legales.
Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke
Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke
Cornell Law Faculty Working Papers
Our fast-paced age of electronic agreements that ostensibly govern transactions as diverse as downloading software, ordering goods, and engaging in collaborative development projects raises questions regarding the suitability of contract law as the appropriate legal framework. While this question arises in many settings, we focus here on the free and open source software (FOSS) movement because of the maturity and success of its model and the ubiquity of its software. We explore in particular whether open source licenses are supported by consideration, and argue that they are, and that open source licenses are contracts. We further argue that a contractual …
Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner
Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner
All Faculty Scholarship
Is the Internet turning contract law on its head? Many commentators contend it is. Precisely this issue arises in current controversies over end user license agreements (EULAs) and Terms of Use agreements (TOUs, the agreements governing our use of web sites). Commentators complain that, in both cases, the formation process unduly restricts buyers’ freedom; and, that sellers and web site owners exploit the process to impose terms that deprive consumers of important intellectual property and privacy rights. The courts ignore the criticisms and routinely enforce EULAs and TOUs. There is truth on both sides of this court/commentator divide. EULAs and …
Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens
Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens
ExpressO
Electronic contractual arrangements have raised complex legal issues unprecedented in the law. Technology s impact on traditional contract law doctrines is readily apparent in the dilemmas generated by recent developments in computer software, hardware, and Internet transactions. In such transactions, sellers have increasingly begun utilizing “clickwrap” agreements, whereby standard terms and conditions are displayed on the computer screen when the user attempts to access the seller’s services. Not surprisingly, the enforceability of clickwrap terms, which are often not known to the user until after payment, has become a subject of much debate in the courts. Because many of the clickwrap …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Technoconsen(T)Sus, Andrea M. Matwyshyn
Technoconsen(T)Sus, Andrea M. Matwyshyn
ExpressO
Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …
Open Source, Free Software And Contractual Issues, Jose Javier González De Alaiza
Open Source, Free Software And Contractual Issues, Jose Javier González De Alaiza
ExpressO
“Free software” is an increasingly used form to license computer programs, which on the one hand gives users the rights to use, modify and redistribute the program; and, on the other, forces any person redistributing an original or modified version of the program to license it with the same rights. Such a forced obligation is introduced through the so called “copyleft clause” and, basically, uses Copyright in a creative way to achieve freedom instead of control.
This paper discusses the “free software” foundations and contractual issues. The discussion is structured in two main parts and Conclusion. In Part II, the …
Applying Tort Theory To Information Technology, Marvin L. Longabaugh
Applying Tort Theory To Information Technology, Marvin L. Longabaugh
ExpressO
In this article, I discuss the issue of whether torts attributable to Information Systems products, both hardware and software, should be subject to litigation as a contract action, a tort action, or both. I further suggest a protocol for attorneys and courts to consider when attempting to discern whether a particular cause of action is appropriate. Last, I briefly discuss whether the advent of certification programs for computer professionals should result in the courts reconsideration of the concept of computer malpractice.
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.