Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Southern Methodist University (13)
- The Catholic University of America, Columbus School of Law (9)
- DePaul University (6)
- Texas A&M University School of Law (5)
- University of Michigan Law School (4)
-
- Seattle University School of Law (3)
- University of Washington School of Law (3)
- American University Washington College of Law (2)
- Brooklyn Law School (2)
- Case Western Reserve University School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Pennsylvania Carey Law School (2)
- California Western School of Law (1)
- Maurer School of Law: Indiana University (1)
- Schulich School of Law, Dalhousie University (1)
- St. Mary's University (1)
- Universitas Indonesia (1)
- University of Pittsburgh School of Law (1)
- Villanova University Charles Widger School of Law (1)
- Keyword
-
- Technology (6)
- Artificial intelligence (4)
- Regulation (4)
- Copyright (3)
- Bias (2)
-
- Content moderation (2)
- Copyright infringement (2)
- Data (2)
- Data Privacy (2)
- International law (2)
- Internet (2)
- Machine learning (2)
- Predictive analytics (2)
- Software (2)
- YouTube (2)
- AI (1)
- API (1)
- Abstraction-filtration-comparison (1)
- Account regulation (1)
- Accuracy (1)
- Adjudicating by algorithm (1)
- Adjudication (1)
- Administrative law (1)
- Advertisement (1)
- Algorithm (1)
- Algorithmic governance (1)
- Algorithms (1)
- Americans With Disabilities Act; ADA; Title III; website accessibility; place of public accommodation; public accommodation; circuit split; predatory litigation; WCAG (1)
- Anti-satellite weapons (1)
- Antitrust Law (1)
- Publication
-
- SMU Science and Technology Law Review (13)
- Catholic University Journal of Law and Technology (9)
- DePaul Journal of Art, Technology & Intellectual Property Law (6)
- Faculty Scholarship (5)
- Michigan Technology Law Review (3)
-
- Seattle University Law Review (3)
- All Faculty Scholarship (2)
- Journal of Business & Technology Law (2)
- Journal of Law, Technology, & the Internet (2)
- Washington Law Review (2)
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Book Chapters, & Popular Press (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Brooklyn Law Review (1)
- Indonesia Law Review (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Keep Up With the Latest News from the Law School (blog) (1)
- Law & Economics Working Papers (1)
- St. Mary's Law Journal (1)
- Student Scholarship (1)
- Tech Policy Lab (1)
- Villanova Environmental Law Journal (1)
- Publication Type
Articles 1 - 30 of 60
Full-Text Articles in Science and Technology Law
Establishing A Legitimate Indonesia’S Government Electronic Surveillance Regulation: A Comparison With The U.S. Legal Practices, Citra Yuda Nur Fatihah
Establishing A Legitimate Indonesia’S Government Electronic Surveillance Regulation: A Comparison With The U.S. Legal Practices, Citra Yuda Nur Fatihah
Indonesia Law Review
Cybersecurity and privacy have now become a matter of increasing concern for citizens, the private sector, and the Indonesian government. The government is currently struggling to combat cyberattacks and data breaches. Indonesia is, in fact, in the early stages of developing a national cybersecurity strategy. The legal framework for cybersecurity in Indonesia is still weak. The one and only legal basis for regulating cybersecurity, privacy, and security, in Indonesia so far is the Electronic Information and Transactions Law No. 11/2008 and its revised version Law No.19/2016. Furthermore, the government through the Indonesian Ministry of Communication and Information has just issued …
Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd
Indiana Law’S Lubin, Sun Help Advise Kosovo Government On Country’S Cybersecurity Act, James Owsley Boyd
Keep Up With the Latest News from the Law School (blog)
No abstract provided.
Content Moderation Remedies, Eric Goldman
Content Moderation Remedies, Eric Goldman
Michigan Technology Law Review
This Article addresses a critical but underexplored aspect of content moderation: if a user’s online content or actions violate an Internet service’s rules, what should happen next? The longstanding expectation is that Internet services should remove violative content or accounts from their services as quickly as possible, and many laws mandate that result. However, Internet services have a wide range of other options—what I call “remedies”—they can use to redress content or accounts that violate the applicable rules. This Article describes dozens of remedies that Internet services have actually imposed. It then provides a normative framework to help Internet services …
Individuals As Gatekeepers Against Data Misuse, Ying Hu
Individuals As Gatekeepers Against Data Misuse, Ying Hu
Michigan Technology Law Review
This article makes a case for treating individual data subjects as gatekeepers against misuse of personal data. Imposing gatekeeper responsibility on individuals is most useful where (a) the primary wrongdoers engage in data misuse intentionally or recklessly; (b) misuse of personal data is likely to lead to serious harm; and (c) one or more individuals are able to detect and prevent data misuse at a reasonable cost.
As gatekeepers, individuals should have a legal duty to take reasonable measures to prevent data misuse where they are aware of facts indicating that the person seeking personal data from them is highly …
Autonomous Corporate Personhood, Carla L. Reyes
Autonomous Corporate Personhood, Carla L. Reyes
Washington Law Review
Several states have recently changed their business organization law to accommodate autonomous businesses—businesses operated entirely through computer code. A variety of international civil society groups are also actively developing new frameworks— and a model law—for enabling decentralized, autonomous businesses to achieve a corporate or corporate-like status that bestows legal personhood. Meanwhile, various jurisdictions, including the European Union, have considered whether and to what extent artificial intelligence (AI) more broadly should be endowed with personhood to respond to AI’s increasing presence in society. Despite the fairly obvious overlap between the two sets of inquiries, the legal and policy discussions between the …
Copyright’S Deprivations, Anne-Marie Carstens
Copyright’S Deprivations, Anne-Marie Carstens
Washington Law Review
This Article challenges the constitutionality of a copyright infringement remedy provided in federal copyright law: courts can order the destruction or other permanent deprivation of personal property based on its mere capacity to serve as a vehicle for infringement. This deprivation remedy requires no showing of actual nexus to the litigated infringement, no finding of willfulness, and no showing that the property’s infringing uses comprise the significant or predominant uses. These striking deficits stem from a historical fiction that viewed a tool of infringement, such as a printing plate, as the functional equivalent of an infringing copy itself. Today, though, …
The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery
The Dangers Of Doxing And Swatting: Why Texas Should Criminalize These Malicious Forms Of Cyberharassment, Hannah Mery
St. Mary's Law Journal
Abstract forthcoming.
The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner
The Rise Of Ada Title Iii: How Congress And The Department Of Justice Can Solve Predatory Litigation, Sarah E. Zehentner
Brooklyn Law Review
The Americans with Disabilities Act (ADA) was enacted in 1990 to afford equal opportunities for individuals with disabilities. Title III of the ADA, specifically, was enacted to afford disabled individuals equal access to places of public accommodation. When the ADA was enacted, the internet was still in its infancy and Congress did not contemplate the need for governing accessibility to websites of public accommodations. Today, the internet has become embedded in virtually every aspect of our lives, yet there are still millions of disabled individuals who are unable to equally access the websites of American businesses. With the ADA being …
The Case For Banning (And Mandating) Ransomware Insurance, Kyle D. Logue, Adam B. Shniderman
The Case For Banning (And Mandating) Ransomware Insurance, Kyle D. Logue, Adam B. Shniderman
Law & Economics Working Papers
Ransomware attacks are becoming increasingly pervasive and disruptive. Not only are they shutting down (or at least “holding up”) businesses and local governments all around the country, they are disrupting institutions in many sectors of the U.S. economy — from school systems, to medical facilities, to critical elements of the U.S. energy infrastructure as well as the food supply chain. Ransomware attacks are also growing more frequent and the ransom demands more exorbitant. Those ransom payments are increasingly being covered by insurance. That insurance offers coverage for a variety of cyber-related losses, including many of the costs arising out of …
The Commodification Of Personal Data And The Road To Consumer Autonomy Through The Ccpa, Blaire Rose
The Commodification Of Personal Data And The Road To Consumer Autonomy Through The Ccpa, Blaire Rose
Brooklyn Journal of Corporate, Financial & Commercial Law
The internet has transformed into a museum of personal information collected through the digital footprint we leave behind after each act performed on the web. Businesses have monetized this collection of personal data in various ways. For instance, many companies analyze this information through predicting analytics and data profiling to identify consumer interests that they can exploit as a means to generate revenue. Though user data promotes many benefits for businesses and consumers alike, the recent data breaches of massive companies, coupled with hazy privacy disclosures that beget consent disputes, have left both users and businesses perturbed and exposed to …
Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas
Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas
Michigan Technology Law Review
Policymakers are faced with a vexing problem: how to increase competition in a tech sector dominated by a few giants. One answer proposed and adopted by regulators in the United States and abroad is to require large platforms to allow consumers to move their data from one platform to another, an approach known as data portability. Facebook, Google, Apple, and other major tech companies have enthusiastically supported data portability through their own technical and political initiatives. Today, data portability has taken hold as one of the go-to solutions to address the tech industry’s competition concerns.
This Article argues that despite …
Barnet As Tr. Of 2012 Saretta Barnet Revocable Tr. V. Ministry Of Culture & Sports Of The Hellenic Republic, 961 F.3d 193 (2d Cir. 2020), Meghan Jackson
Barnet As Tr. Of 2012 Saretta Barnet Revocable Tr. V. Ministry Of Culture & Sports Of The Hellenic Republic, 961 F.3d 193 (2d Cir. 2020), Meghan Jackson
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Fighting To Protect Individual Privacy In A Rapidly Advancing Technological World, Farzana Ahmed
Fighting To Protect Individual Privacy In A Rapidly Advancing Technological World, Farzana Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
The Nflpo: The Nfl's Private Patent Office, Paul Fina
The Nflpo: The Nfl's Private Patent Office, Paul Fina
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Ex Ante Intellectual Property Considerations For Small Businesses, Jason A. Sanders
Ex Ante Intellectual Property Considerations For Small Businesses, Jason A. Sanders
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Revitalizing Language Through Education: Ireland's Use Of International Law To Drive Linguistic Preservation, Emma A. O'Connell
Revitalizing Language Through Education: Ireland's Use Of International Law To Drive Linguistic Preservation, Emma A. O'Connell
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
The Data Privacy Landscape During Covid-19: An Exploration Of Some Of The Major Data Privacy Regulations And Trends, Gitanjali Deb
The Data Privacy Landscape During Covid-19: An Exploration Of Some Of The Major Data Privacy Regulations And Trends, Gitanjali Deb
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Data Autonomy, Cesare Fracassi, William Magnuson
Data Autonomy, Cesare Fracassi, William Magnuson
Faculty Scholarship
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers, and the media have, nearly in unison, decried the lack of data privacy in the modern world. In response, they have put forth various proposals to remedy the situation, from the imposition of fiduciary obligations on technology platforms to the creation of rights to be forgotten for individuals. All these proposals, however, share one essential assumption: we must raise greater protective barriers around data. As a scholar of corporate finance and a scholar of corporate law, respectively, we find this assumption problematic. Data, after all, …
Toto, I'Ve A Feeling The Environment Isn't Safe From Cryptocurrency Anymore: The Degrading Ecological Effects Of Bitcoin And Digital Currencies, Samantha T. Edgell
Toto, I'Ve A Feeling The Environment Isn't Safe From Cryptocurrency Anymore: The Degrading Ecological Effects Of Bitcoin And Digital Currencies, Samantha T. Edgell
Villanova Environmental Law Journal
No abstract provided.
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Protecting Children In The Frontier Of Surveillance Capitalism, Cole F. Watson
Protecting Children In The Frontier Of Surveillance Capitalism, Cole F. Watson
Student Scholarship
This article examines the ongoing technological revolution and its impact on today’s consumers. In particular, this article addresses the promulgation of the Children’s Online Privacy Protection Act (COPPA) in the context of “surveillance capitalism”2 and analyzes the harms associated with social media and data collection. Finally, this paper will argue that COPPA should be revamped to better regulate the Internet of 2020. A just society ought to protect children from the lurking perils of social media.
A Unified Theory Of Data, William Magnuson
A Unified Theory Of Data, William Magnuson
Faculty Scholarship
How does the proliferation of data in our modern economy affect our legal system? Scholars that have addressed the question have nearly universally agreed that the dramatic increases in the amount of data available to companies, as well as the new uses to which that data is being put, raise fundamental problems for our regulatory structures. But just what those problems might be remains an area of deep disagreement. Some argue that the problem with data is that current uses lead to discriminatory results that harm minority groups. Some argue that the problem with data is that it impinges on …
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
Articles in Law Reviews & Other Academic Journals
The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Catholic University Journal of Law and Technology
This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Catholic University Journal of Law and Technology
The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.
Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek
Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek
Catholic University Journal of Law and Technology
Space security is essential to global safety and prosperity. International treaties should modernize and reflect the world’s innovation in space and governance needs. One must look back to 1967 for the inaugural “Outer Space Treaty,” the first and only binding multilateral agreement for peaceful space use and exploration. In 50 years, technologies and space capabilities have evolved; an updated global treaty and agreement should be developed and evaluated. Both China and Russia have demonstrated their capability to degrade and/or destroy adversaries’ satellites in space. Space wars are no longer a hypothetical. The future once discussed and anxiously anticipated after Sputnik …
No Ifs, Ands, Or Juuls About It: Why Influencers Must Be Held Accountable, Krystina Dorta
No Ifs, Ands, Or Juuls About It: Why Influencers Must Be Held Accountable, Krystina Dorta
Catholic University Journal of Law and Technology
This article analyzes how the FTC’s Endorsement Guide regulating the advertising of e-cigarette products should be applied to social media influencers. The struggle to regulate e-cigarettes by the FDA and the FTC has led to different advertising methods, which either comply with or neglect the FTC’s Endorsement Guide. This article evaluates the federal government’s reaction to the e-cigarette health crisis, followed by a review of the FTC’s previous actions addressing Endorsement Guide violations, along with the consequences on other companies’ marketing strategies. Finally, this article reviews influencer liability standards for Endorsement Guide violations and develops recommendations to improve those standards.
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
Catholic University Journal of Law and Technology
The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.
Sounds Of Science: Copyright Infringement In Ai Music Generator Outputs, Eric Sunray
Sounds Of Science: Copyright Infringement In Ai Music Generator Outputs, Eric Sunray
Catholic University Journal of Law and Technology
The music business is no stranger to disruptive technology. The industry’s apparent comeback from the devastating downturn caused by illegal file sharing seems to have arrived just in time for what may be an even more disruptive technological phenomenon: artificial intelligence (“AI”). Much has been said about the implications of AI-generated music, ranging from issues of ownership, to rights of publicity. However, there has been surprisingly little discussion of infringement in the AI systems’ outputs. By examining the functionality of AI music generators through the lens of de minimis use case law, this paper will explain how the outputs of …