Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 955

Full-Text Articles in Intellectual Property Law

Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim Jun 2024

Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim

Washington Journal of Law, Technology & Arts

The internet has become more ubiquitously available than ever before, with search engines serving as the portals to an unparalleled amount of information. As a byproduct of this phenomenon, a vast amount of internet search history has also begun to enter legal proceedings as evidence. The most intimate questions that defendants have asked their search engines have begun to be examined under the scope of the Federal Rules of Evidence or a state equivalent. This Comment examines the admissibility of internet search history and provides a general legal framework based on the Federal Rules of Evidence. Drawing upon six cases, …


Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper Jun 2024

Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper

Washington Journal of Law, Technology & Arts

Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …


When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang Jun 2024

When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang

Washington Journal of Law, Technology & Arts

The emergence of generative artificial intelligence (AI) systems poses novel challenges for the right to be forgotten. While this right gained prominence following the 2014 Google Spain v. Gonzalez case, generative AI’s limitless memory and ability to reproduce identifiable data from fragments threaten traditional conceptions of forgetting. This Article traces the evolution of the right to be forgotten from its privacy law origins towards an independent entitlement grounded in self-determination for personal information. However, it contends the inherent limitations of using current anonymization, deletion, and geographical blocking mechanisms to prevent AI models from retaining personal data render forgetting infeasible. Moreover, …


The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier Jun 2024

The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier

Washington Journal of Law, Technology & Arts

This paper explains the need for an international AI research initiative. The current focus of lawmakers at the subnational, national, and international level on regulation over research has created an imbalance, neglecting the critical role of continuous, informed research in developing laws that keep pace with rapid technological advancements in AI.

The proposed international AI research initiative would serve as a central hub for comprehensive AI risk analysis, modeled on successful precedents like CERN and the IPCC. CERN exemplifies a collaborative research environment with pooled resources from member states, leading to significant advancements in particle physics. Similarly, the IPCC has …


Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber Jun 2024

Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber

DePaul Business & Commercial Law Journal

No abstract provided.


Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton Jun 2024

Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton

DePaul Business & Commercial Law Journal

No abstract provided.


Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu Jun 2024

Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu

DePaul Business & Commercial Law Journal

No abstract provided.


Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani Jun 2024

Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani

DePaul Business & Commercial Law Journal

No abstract provided.


The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin Jun 2024

The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin

DePaul Business & Commercial Law Journal

No abstract provided.


Front Matter Jun 2024

Front Matter

DePaul Business & Commercial Law Journal

No abstract provided.


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter Apr 2024

Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman Apr 2024

A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves Apr 2024

Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Beautifying The Human Experience: The Road To Knocking Out The Knockoff Industry Through Adaptions To Copyright & Design Patent Protections For Clothing, Moira Mccabe Apr 2024

Beautifying The Human Experience: The Road To Knocking Out The Knockoff Industry Through Adaptions To Copyright & Design Patent Protections For Clothing, Moira Mccabe

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


All Eyez On Rap & Hip-Hop: Analyzing How Black Expression Is Criminalized And The Language Of The Rap Act Of 2022, Maia Young Apr 2024

All Eyez On Rap & Hip-Hop: Analyzing How Black Expression Is Criminalized And The Language Of The Rap Act Of 2022, Maia Young

Washington Journal of Law, Technology & Arts

The Black existence, in the United States of America, has always been regarded as a conditional right. Conventionally, Blackness must always be nonviolent and non-disruptive to safely exist. Because of this, Blackness cannot be confined to restraints and disrupts these conventions with acts of joy and creative expression. Black creativity is both unconventional and sacred. Black creative expression documents, preserves, and unifies cultural lived experiences, from a first-hand lens of those oppressed. Creative and artistic expression celebrates the myriad of stories that are a part of the collective Black experience. Yet, Black creative expression is now being weaponized by prosecutors …


Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi Apr 2024

Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi

Washington Journal of Law, Technology & Arts

On February 8, 2022, the Italian Parliament approved constitutional amendments to protect the environment. A member of Parliament stated that the environment is an element of Italy, and that safeguarding the environment means safeguarding humans. The need to protect the environment seems to have become a critical component of public conscience. Likewise, if society perceives that artificial intelligence is vitally important for humanity, does constitutional law allow constitutional rights for artificial intelligence to be created?

Extending constitutional rights to artificial intelligence may be consistent with the jurisprudential history of rights. Constitutional rights have undergone metamorphosis over time to protect new …


Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou Apr 2024

Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou

Washington Journal of Law, Technology & Arts

This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …


Foreword, Deborah W. Denno, Erica Valencia-Graham Apr 2024

Foreword, Deborah W. Denno, Erica Valencia-Graham

Fordham Law Review

This Foreword overviews an unprecedented Symposium on these wide ranging topics titled The New AI: The Legal and Ethical Implications of ChatGPT and Other Emerging Technologies. Hosted by the Fordham Law Review and cosponsored by Fordham University School of Law’s Neuroscience and Law Center on November 3, 2023, the Symposium brought together attorneys, judges, professors, and scientists to explore the opportunities and risks presented by AI, especially GenAI like ChatGPT. The discussion raised complex questions concerning AI sentience and personal privacy, as well as the future of legal ethics, education, and employment. Although the AI industry uniformly predicts ever more …


Robots As Pirates, Henry H. Perritt Jr. Jan 2024

Robots As Pirates, Henry H. Perritt Jr.

Catholic University Law Review

Generative AI has created much excitement over its potential to create new works of authorship in the literary and graphical realms. Its underling machine-learning technology works by analyzing the relations among elements of preexisting material in enormous databases assembled from publicly available and licensed sources. Its algorithms “learn” to predict “what comes next” in different types of expression. A complete system thus can become glib in creating new factual summaries, essays, fictional stories and images.

A number of authors of the raw material used by Generative AI engines claim that the machine learning process infringes their copyrights. Careful evaluation of …


Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky Jan 2024

Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky

University of Miami Business Law Review

For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …


Privacy’S Next Act, Erik Lampmann-Shaver Jan 2024

Privacy’S Next Act, Erik Lampmann-Shaver

Washington Journal of Law, Technology & Arts

This Article identifies and describes three data privacy policy developments from recent legislative sessions that may seem unrelated, but which I contend together offer clues about privacy law’s future over the short-to-medium term.

The first is the proliferation, worldwide and in U.S. states, of legislative proposals and statutes referred to as “age-appropriate design codes.” Originating in the United Kingdom, age-appropriate design codes typically apply to online services “directed to children” and subject such services to transparency, default settings, and other requirements. Chief among them is an implied obligation to conduct ongoing assessments of whether a service could be deemed “directed …


Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao Jan 2024

Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao

Washington Journal of Law, Technology & Arts

This article investigates the longevity of health QR codes, a digital instrument of pandemic surveillance, in post-COVID China. From 2020 to 2022, China widely used this tri-color tool to combat the COVID-19 pandemic. A commonly held assumption is that health QR codes have become obsolete in post-pandemic China. This study challenges such an assumption. It reveals their persistence and integration - through mobile apps and online platforms - beyond the COVID-19 public health emergency. A prolonged, expanded and normalized use of tools which were originally intended for contact tracing and pandemic surveillance raises critical legal and ethical concerns. Moreover, their …


Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real Jan 2024

Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real

Washington Journal of Law, Technology & Arts

In this article, we apply historical copyright principles to the evolving state of text-to-image generation and explore the implications of emerging technological constructs for copyright’s fair use doctrine. Artificial intelligence (“AI”) is frequently trained on copyrighted works, which usually involves extensive copying without owners’ authorization. Such copying could constitute prima facie copyright infringement, but existing guidance suggests fair use should apply to most machine learning contexts. Mark Lemley and Bryan Casey argue that training machine learning (“ML”) models on copyrighted material should generally be permitted under fair use when the model’s outputs transcends the purpose of its inputs. Their arguments …


Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella Jan 2024

Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella

Washington Journal of Law, Technology & Arts

If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.

In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …


Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu Jan 2024

Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu

Seattle University Law Review

Robo-voting is the practice by an investment fund of mechanically voting in corporate elections according to the advice of its proxy advisor— in effect fully delegating its voting decision to its advisor. We examined over 65 million votes cast during the period 2008–2021 by 14,582 mutual funds to describe and quantify the prevalence of robo-voting. Overall, 33% of mutual funds robo-voted in 2021: 22% with ISS, 4% with Glass Lewis, and six percent with the recommendations of the issuer’s management. The fraction of funds that robo-voted increased until around 2013 and then stabilized at the current level. Despite the sizable …