Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Washington and Lee Law Review

Algorithm

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Law

Risk Assessment And Immigration Court, Richard Frankel Jan 2023

Risk Assessment And Immigration Court, Richard Frankel

Washington and Lee Law Review

Risk assessment and algorithmic tools have become increasingly popular in recent years, particularly with respect to detention and incarceration decisions. The emergence of big data and the increased sophistication of algorithmic design hold the promise of more accurately predicting whether an individual is dangerous or a flight risk, overcoming human bias in decision-making, and reducing detention without compromising public safety. But these tools also carry the potential to exacerbate racial disparities in incarceration, create a false veneer of objective scientific accuracy, and spawn opaque decision-making by “black box” computer programs.

While scholars have focused much attention on how judges in …


Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty Jan 2022

Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty

Washington and Lee Law Review

The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …


Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon Jan 2022

Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon

Washington and Lee Law Review

In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.

This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …