Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 313

Full-Text Articles in Science and Technology Law

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Sales Suppression: The International Dimension, Richard Thompson Ainsworth Oct 2016

Sales Suppression: The International Dimension, Richard Thompson Ainsworth

Faculty Scholarship

Sales transaction taxes are highly susceptible to technology fraud, which is an inevitable result of today’s widespread reliance on technology to document taxed transactions. Technology can be (and is) manipulated to defeat the collection of these taxes. Both the U.S. retail sales tax (RST) and the European value added tax (VAT) are vulnerable to technology-based fraud. This Article concerns sales suppression — intentionally not recording sales — in the RST, and at the final stage of the VAT, the retail stage, when tax is collected from final consumers.

The modern electronic cash register (ECR)/point of sale (POS) system is vulnerable …


Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson Sep 2016

Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson

Stephen E Henderson

Chairman Barrington, Vice Chair Brooks, members of the Committee on Public Safety, Senators, and distinguished guests, I am grateful for the opportunity to speak to you today about unmanned aerial systems, or drones, and more particularly about their federal constitutional implications and what might be the constitutional restrictions on any legislation you might like to enact. I am the Judge Haskell A. Holloman Professor of Law at the University of Oklahoma, where my teaching and research focus on criminal law and procedure and privacy, including the constitutional rights pertaining thereto.

My topic is not an easy one. The constitutional law …


Ebola, Experimental Medicine, Economics, And Ethics: An Evaluation Of International Disease Outbreak Law, Sara L. Dominey Sep 2016

Ebola, Experimental Medicine, Economics, And Ethics: An Evaluation Of International Disease Outbreak Law, Sara L. Dominey

Georgia Journal of International & Comparative Law

No abstract provided.


Marine Law Symposium: Legal And Policy Approaches To Reduce Marine Debris In New England 11/04/2016, Roger Wiliams University School Of Law Sep 2016

Marine Law Symposium: Legal And Policy Approaches To Reduce Marine Debris In New England 11/04/2016, Roger Wiliams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder Sep 2016

Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder

The University of Cincinnati Intellectual Property and Computer Law Journal

Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …


The Academy Standards Board For Firearms And Toolmarks, Robert M. Sanger Aug 2016

The Academy Standards Board For Firearms And Toolmarks, Robert M. Sanger

Robert M. Sanger

This article will discuss the Academy Standards Board Consensus Body for Forensics in the area of Firearms and Toolmarks, and its role in the scheme of standards, commissions and entities doing this type of work.


21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell Aug 2016

21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell

Mary Ellen O'Connell

The world faces tough arms control challenges from preventing the development and use of weapons of mass destruction to regulating the new weapons of the computer revolution. This article considers what works in arms control. Using military force in violation of international law to destroy nuclear facilities, to stop weapons shipments, or to punish the use of prohibited weapons typically fails. Diplomacy paired with lawful counter-measures has the superior track record. Reviving the art of diplomacy and re-committing to authentic international law will pay dividends in peace and security.


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


"I'Ll See": How Surveillance Undermines Privacy By Eroding Trust, Robert H. Sloan, Richard Warner Aug 2016

"I'Ll See": How Surveillance Undermines Privacy By Eroding Trust, Robert H. Sloan, Richard Warner

Santa Clara High Technology Law Journal

"I'll See": How Surveillance Undermines Privacy By Eroding Trust


Can Digital Speech Loosen The Gordian Knot Of Reputation Law?, Elizabeth A. Kirley Aug 2016

Can Digital Speech Loosen The Gordian Knot Of Reputation Law?, Elizabeth A. Kirley

Santa Clara High Technology Law Journal

Can Digital Speech Loosen the Gordian Knot of Reputation Law?


Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher Aug 2016

Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher

Pace International Law Review

Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …


After O2 Micro: The Court's Evolving Duty To Map Words To Things, Peter E. Gratzinger Aug 2016

After O2 Micro: The Court's Evolving Duty To Map Words To Things, Peter E. Gratzinger

Santa Clara High Technology Law Journal

After O2 Micro: The Court's Evolving Duty to Map Words to Things


The Lautenberg Act: Chemical Safety Overhaul Of The Toxic Substances Control Act, Alyssa S. Rosen Aug 2016

The Lautenberg Act: Chemical Safety Overhaul Of The Toxic Substances Control Act, Alyssa S. Rosen

Elisabeth Haub School of Law Faculty Publications

On June 22, 2016, President Obama signed the Frank Lautenberg Chemical Safety for the 21st Century Act (Lautenberg Act), a landmark bipartisan compromise legislation designed to overhaul the Toxic Substances Control Act (TSCA). The Lautenberg Act makes it easier for the U.S. Environmental Protection Agency (EPA) to regulate toxic substances while providing the chemical industry with regulatory clarity and certainty. Law Librarians, practicing lawyers, and academics have taken note of this groundbreaking law that most likely will set the template for the next generation of environmental reform by tackling issues such as preemption of state law, protection of vulnerable populations, …


The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik Aug 2016

The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik

Eliza Mik

Online businesses influence consumer behaviour by means of a wide range of technologies that determine what information is displayed as well as how and when it is displayed. This creates an unprecedented power imbalance between the transacting parties, raising questions not only about the permissible levels of procedural exploitation in contract law, together with the adequacy of existing consumer protections but also about the impact of technology on consumer autonomy. There is, however, no single technology that threatens the latter. It is the combined, mutually-enforcing effect of multiple technologies that influence consumer choices at different stages in the transacting process, …


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham Aug 2016

Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham

Faculty Scholarship

Bitcoin is the world’s first peer-to-peer cryptocurrency. VATCoin is similar, but it is used in tax compliance. Both Bitcoin and VATCoin are distributive ledger applications built upon blockchain technology. Bitcoin’s ledger is public; VATCoin’s is private. If adopted, VATCoin could well become the world’s first government-mandated cryptotaxcurrency. Unlike Bitcoin, VATCoin will not be a speculative currency. It is always fixed to the home currency.

This paper proposes that the Gulf Cooperation Council (GCC) adopt VATCoin in its VAT Framework. The GCC is expected to have multiple 5% VATs in place by January 1, 2018. There is an ample amount of …


Vat In The Gcc - Missing Trader Frauds, Richard Thompson Ainsworth, Musaad Alwohaibi Aug 2016

Vat In The Gcc - Missing Trader Frauds, Richard Thompson Ainsworth, Musaad Alwohaibi

Faculty Scholarship

All VATs are susceptible to missing trader (MT) fraud. VATs adopted in an economic community are particularly more susceptible. The EU, for example, loses in excess of €100b annually to this fraud. Given the anticipated adoption of a European-style credit-invoice VAT in the GCC by January 1, 2018, this paper offers a technology-based solution involving the real-time tracking of taxable transactions with centrally collected (securely encrypted) data flows that are risk-analyzed by artificial intelligence (AI).


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Neuroimaging Evidence: A Solution To The Problem Of Proving Pain And Suffering?, Brady Somers Jul 2016

Neuroimaging Evidence: A Solution To The Problem Of Proving Pain And Suffering?, Brady Somers

Seattle University Law Review

Envision a plaintiff who was injured on the job at a construction site due to his employer’s negligence. The plaintiff has chronic back pain, but it is not verifiable on an X-ray, nor is a physical injury readily discernible by any other technology. Presently, fact finders are given the broad discretion to decide whether they find this plaintiff credible, and accordingly, whether they believe he is truly in pain and deserves damages for pain and suffering. However, neuroimaging—specifically functional magnetic resonance imaging (fMRI)—could allow those fact finders to visualize whether this plaintiff was hurting by depicting the unique signatures that …


Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann Jul 2016

Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann

Seattle University Law Review

Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …


Patents And Traditional Knowledge Of The Uses Of Plants: Is A Communal Patent Regime Part Of The Solution To The Scourge Of Bio Piracy, Ikechi Mgbeoji Jul 2016

Patents And Traditional Knowledge Of The Uses Of Plants: Is A Communal Patent Regime Part Of The Solution To The Scourge Of Bio Piracy, Ikechi Mgbeoji

Ikechi Mgbeoji

No abstract provided.


A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof Jul 2016

A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof

Michigan Telecommunications & Technology Law Review

For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …


Uncle Sam Is Watching You: A Recommendation For Minnesota Legislation Regarding Police Drone Use, Joe R. Paquette Jul 2016

Uncle Sam Is Watching You: A Recommendation For Minnesota Legislation Regarding Police Drone Use, Joe R. Paquette

Mitchell Hamline Law Review

No abstract provided.


Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank Pasquale Jul 2016

Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank Pasquale

Faculty Scholarship

No abstract provided.


Taxation By Condition: Spectrum Repurposing At The Fcc And The Prolonging Of Spectrum Exhaust, T. Randolph Beard, George S. Ford, Lawrence J. Spiwak, Michael Stern Jul 2016

Taxation By Condition: Spectrum Repurposing At The Fcc And The Prolonging Of Spectrum Exhaust, T. Randolph Beard, George S. Ford, Lawrence J. Spiwak, Michael Stern

UC Law Science and Technology Journal

In this article, we show how the Federal Communications Commission’s regulatory process may be used by special interests (and the Agency) to impede the efficient functioning of a secondary market for commercial spectrum. In particular, we show that imposing (and threatening to impose) significant conditions when firms seek to repurpose spectrum from a low-value to a highervalue use acts as a “tax” and thus reduces the incentives of firms to exchange spectrum in the secondary market. As a result, “taxation by condition” will discourage the larger scale transactions necessary to resolve the acknowledged spectrum shortages in the commercial mobile wireless …


You Can Dance If You Want To? Initial Interpretations Of The Bpcia’S Patent Dance With Sandoz And Amgen, Jenny M. Alsup Jul 2016

You Can Dance If You Want To? Initial Interpretations Of The Bpcia’S Patent Dance With Sandoz And Amgen, Jenny M. Alsup

UC Law Science and Technology Journal

As patents covering brand-name biologics begin to expire, biosimilar manufacturers are preparing to enter the market. Since its enactment in 2010, many have speculated on how the Biologics Price Competition and Innovation Act will influence competition and innovation, and whether the provisions struck the right balance. Now for the first time, the judiciary is interpreting the so-called “patent dance,” the Act’s information exchange and litigation provisions, in decisions that will impact the biosimilar landscape in the years to come. Two cases involving the biologic manufacturers Sandoz and Amgen illustrate the Act’s susceptibility to different interpretations.


The Standard Of Review For Claim Construction In Inter Partes Review, Alana Canfield Mannigé Jul 2016

The Standard Of Review For Claim Construction In Inter Partes Review, Alana Canfield Mannigé

UC Law Science and Technology Journal

The Court of Appeals for the Federal Circuit (Federal Circuit) hears appeals from the United States Patent & Trademark Office (PTO). Recently, the American Invents Act expanded the PTO’s power in the patent world by creating new types of proceedings, including Inter Partes Review (IPR), by which one may challenge the validity of a patent. To determine the validity of patent claims in IPR proceedings, the PTO must first perform claim construction. As an administrative agency, the decisions of the PTO (such as claim construction) should be accorded significant deference by way of the Administrative Procedure Act (APA). In the …


The Fcc And The “Pre-Internet”, John Blevins Jul 2016

The Fcc And The “Pre-Internet”, John Blevins

Indiana Law Journal

Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.

This Article, however, argues that …


Surrogacy And Citizenship: A Conjunctive Solution To A Global Problem, Caitlin Pyrce Jul 2016

Surrogacy And Citizenship: A Conjunctive Solution To A Global Problem, Caitlin Pyrce

Indiana Journal of Global Legal Studies

People around the world are turning to surrogacy when they are unable to conceive by traditional means. When surrogacy turns traditional notions of parentage upside down, however, countries struggle to find efficient regulations that protect their own citizens, while still recognizing the increasingly global nature of modern society. Children born through surrogacy arrangements between Thai surrogate mothers and Australian intended parents have been confronted with the consequences of inadequate regulation. This note argues that in addition to revising surrogacy legislation to reflect the increasingly transient nature of society, countries must make mirror citizenship reform so children born through surrogacy are …