Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Legislation

2022

Institution
Keyword
Publication
Publication Type

Articles 1 - 21 of 21

Full-Text Articles in Science and Technology Law

Hacking Copyright: Holding Cops Accountable For Abusing Youtube’S Copyright Filter System, Tyler Bloom Dec 2022

Hacking Copyright: Holding Cops Accountable For Abusing Youtube’S Copyright Filter System, Tyler Bloom

Journal of Law and Policy

This Note both explores the mechanisms and incentive structures that make “copyright hacking” possible and explains the legal system’s failure to provide recourse for victims of successful “copyright hacks” by police officers. Because the DMCA has failed to keep pace with the internet’s exponential growth, OSPs, such as YouTube, have developed filtering systems that can be exploited to “copyright hack” users and ultimately suppress their speech. A victim of “copyright hacking” by a police officer currently has no recourse; the doctrine of qualified immunity functionally precludes them from suing for violating their First Amendment rights. This Note proposes two possible …


Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss Oct 2022

Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss

Villanova Environmental Law Journal

No abstract provided.


Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll Oct 2022

Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll

Washington and Lee Journal of Civil Rights and Social Justice

The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas Jun 2022

Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas

Catholic University Law Review

Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …


Session 4: Plunging Into Deep Water: An Immersion In Fintech, Defi (Decentralized Finance), & Web3, Joseph M. Vincent Jun 2022

Session 4: Plunging Into Deep Water: An Immersion In Fintech, Defi (Decentralized Finance), & Web3, Joseph M. Vincent

SITIE Symposiums

This panel featured entrepreneurs providing their expert insight into the background, workings, and expected developments of the FinTech industry. Moderated by Adjunct Professor of Law Joseph M. Vincent, the panel features Ron Oliveira, Kory Hoang, and Jonathan Blanco.

The panelists provided insight on topics regarding: (1) the fundamental changes in financial services since the advent of FinTech; (2) background on the Stablecoin industry including a background of what Stablecoin is, and why it has been under recent scrutiny; and (3) the NFT market and the direction the NFT space is heading. In a Q&A session, the panelists also offered their …


Session 3: Deep Innovation Dive In Health Equity: Truveta (“Saving Lives With Data”), Steve Tapia, Dave Heiner Jun 2022

Session 3: Deep Innovation Dive In Health Equity: Truveta (“Saving Lives With Data”), Steve Tapia, Dave Heiner

SITIE Symposiums

This session is a “deep dive” into health equity and research via a moderated discussion with Truveta, a new data partnership company poised for research breakthroughs in the healthcare sector. In it, Dave Heiner, General Counsel and Chief Policy Officer for Truveta, discusses the company’s healthcare-centered mission and the key role that data plays in the healthcare field.


Session 2: Diversity Perspectives: In-House Counsel, Debbie Akhbari Jun 2022

Session 2: Diversity Perspectives: In-House Counsel, Debbie Akhbari

SITIE Symposiums

This expert panel addressed diversity perspectives in the legal field. Moderated by Debbie Akhbari, six panelists shared their stories. The panelists were Leticia Hernández, Bernadette Lopez, Elida Moran, Catherine Romero, Rachel Seals, and Katina Thornock. Each panelist's stories have been broken into its own section in the summary of proceedings.

Many diverse candidates have incorrect assumptions made about them, resulting in doors being closed by those in positions of power. This panel shared their personal stories and encouraged students and newer attorneys to keep “knocking on those doors” and for those in positions of power to open those doors. Through …


Session 1: Innovation In Legal Services, Steven W. Bender, Michael Cherry, Matthew Spencer Jun 2022

Session 1: Innovation In Legal Services, Steven W. Bender, Michael Cherry, Matthew Spencer

SITIE Symposiums

This panel featured two “disrupters” who detailed their experiences innovating in the legal services space. The first panelist spoke about data-driven regulatory reform and the other spoke as an entrepreneur whose product introduces artificial intelligence (AI) into the legal recruiting process. Two additional panelists provided commentary regarding the second panelist’s presentation.

The panel provided insight on the topics of: (1) the legal regulatory process at large; (2) how a data-driven and feedback-oriented sandbox provides an alternative regulatory process; (3) the legal hiring and recruiting process and (4) how AI allows law firms to consider alternative hiring metrics when assessing candidates …


Introduction To The 5th Annual Innovation And Technology Law Conference, Annette Clark Jun 2022

Introduction To The 5th Annual Innovation And Technology Law Conference, Annette Clark

SITIE Symposiums

Seattle University School of Law’s then dean, now Dean Emerita, Annette Clark, opens the 5th annual Innovation and Technology Law Conference, co-sponsored by the Seattle Journal of Technology, Environmental, and Innovation Law (SJTEIL) at Seattle University School of Law. Annette Clark has been involved with the planning and organization of the Innovation and Technology Law Conference since the conference’s inception. The theme of the 5th annual 2022 conference is “deep innovation dives.”

Annette Clark explains that “This conference is part of our continuing efforts at Seattle [University] Law to expand educational opportunities for our students and community in …


5th Annual Innovation And Technology Law Conference: Deep Innovation Dives, Steven W. Bender Jun 2022

5th Annual Innovation And Technology Law Conference: Deep Innovation Dives, Steven W. Bender

SITIE Symposiums

Steven W. Bender, Seattle University School of Law Professor and organizer of the SITIE Symposium series, details the history of the SITIE symposiums and the 2022 proceedings. He discusses how this year's symposium builds on themes and issues raised in previous symposiums and looks ahead to the 2023 SITIE symposium.


The Long-Term Problem With Electric Vehicle Batteries: A Policy Recommendation To Encourage Advancement For Scalable Recycling Practices, Lauren Fricke Jan 2022

The Long-Term Problem With Electric Vehicle Batteries: A Policy Recommendation To Encourage Advancement For Scalable Recycling Practices, Lauren Fricke

Seattle Journal of Technology, Environmental & Innovation Law

With the growing popularity of electric vehicles, the demand for lithium ion (Li-ion) batteries, which are the dominant energy source for electric vehicles, are skyrocketing. By default, this means a growing demand for the raw materials needed to manufacture these complex batteries such as lithium, cobalt, and nickel. Economic, environmental, and political supply chain factors bring into question the sustainability of these batteries as a solution to the issues surrounding gasoline powered transportation, creating a need for large scale Li-ion battery recycling. By 2030, 140 million EVs are predicted to be on the road worldwide. In that time, eleven million …


Uranium 233: The Nuclear Superfuel No One Is Using, Maris Hanson Jan 2022

Uranium 233: The Nuclear Superfuel No One Is Using, Maris Hanson

Seattle Journal of Technology, Environmental & Innovation Law

Nuclear power offers more energy in less physical space than solar and wind and yields more energy per pound than fossil fuels. However different nuclear fuels yield different waste profiles and create different beneficial products. Uranium 233 (U233) resists use in nuclear weapons, yields beneficial daughter products, and produces dramatically less of the most problematic waste products than Uranium 235 (U235). U233 results from reactions with Thorium, a plentiful, ubiquitous element currently considered waste from rare earth mines. Additionally, U233 functions well in a liquid fuel reactor resulting in safer, more efficient reactors than current solid fuel U235 or Plutonium …


On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


Learning From South Korea’S Covid-19 Response: Why Centralizing The United States Public Health System Is Essential For Future Pandemic Responses, Meghan Ricci Jan 2022

Learning From South Korea’S Covid-19 Response: Why Centralizing The United States Public Health System Is Essential For Future Pandemic Responses, Meghan Ricci

Seattle Journal of Technology, Environmental & Innovation Law

The COVID-19 pandemic revealed stark differences in governmental preparedness across the globe. The United States, once thought of as a global leader in public health, had the theoretical skill and efficiency to handle the pandemic but failed to utilize those skills and resources during an actual health crisis. In the spring of 2020, everyone watched the U.S.’s reaction to the unfolding of the COVID-19 pandemic due to its historic placeholder as a global leader and innovator. However, the performance of the U.S. in response to the global pandemic disappointed both global commentators and U.S. citizens. This paper will compare the …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


Moving From Harm Mitigation To Affirmative Discrimination Mitigation: The Untapped Potential Of Artificial Intelligence To Fight School Segregation And Other Forms Of Racial Discrimination, Andrew Gall Jan 2022

Moving From Harm Mitigation To Affirmative Discrimination Mitigation: The Untapped Potential Of Artificial Intelligence To Fight School Segregation And Other Forms Of Racial Discrimination, Andrew Gall

Catholic University Journal of Law and Technology

No abstract provided.


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


The Wild West Of Data Privacy: Why Rhode Island Needs To Enact Comprehensive Legislation To Protect Consumers’ Data, Candace Quinn Jan 2022

The Wild West Of Data Privacy: Why Rhode Island Needs To Enact Comprehensive Legislation To Protect Consumers’ Data, Candace Quinn

Roger Williams University Law Review

No abstract provided.