Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,113 Full-Text Articles 3,840 Authors 3,199,306 Downloads 127 Institutions

All Articles in Computer Law

Faceted Search

4,113 full-text articles. Page 1 of 120.

Tiktok The Musical: Copyright Issues Raised By The "Ratatouille" Musical, Paige V. Gagliardi 2022 University of Washington School of Law

Tiktok The Musical: Copyright Issues Raised By The "Ratatouille" Musical, Paige V. Gagliardi

Washington Journal of Law, Technology & Arts

TikTok the Musical: Copyright Issues Raised by the “Ratatouille” Musical, explores the growing trend in derivative works and the failures of current copyright law to address it. This article asserts that while derivative works are excellent creative outlets, a safe haven in a tumultuous world, allowing appropriation of copyrights via the fair use doctrine conflicts with the foundations of copyright law. This article argues that IP giants such as the Walt Disney Company have sent a dangerous message to the general public by allowing the TikTok trend of the #ratatouillemusical to become an actual musical: that unlicensed derivative works will ...


A Guide To Federal Broadband Funding Programs - Overview Of Bead (Updated) - June 2022, New York Law School 2022 New York Law School

A Guide To Federal Broadband Funding Programs - Overview Of Bead (Updated) - June 2022, New York Law School

Reports and Resources

No abstract provided.


"I'M Concerned About This Post": Combatting Fake News On Social Media, Jake Latimer 2022 Seattle University School of Law

"I'M Concerned About This Post": Combatting Fake News On Social Media, Jake Latimer

Seattle Journal of Technology, Environmental & Innovation Law

The public concern over the spread of “fake news” on social media has increased over the last decade. Large social networking platforms like Facebook and Twitter have attempted to address fake news by flagging it as misleading. Even former President Trump has seemingly exhibited a sense of paranoia over its spread. While the term “fake news” is often used as a political weapon to discredit unfavorable information and opinions, fake news refers to factually false or grossly misleading content likely designed to sway or entrench one’s opinion on a particular topic. The pervasiveness of this type of fake news ...


Metasoftware: Building Blocks For Legal Technology, Houman Shadab 2022 New York Law School

Metasoftware: Building Blocks For Legal Technology, Houman Shadab

Seattle Journal of Technology, Environmental & Innovation Law

This Article develops a novel concept in information technology called “metasoftware.” It then applies the concept of metasoftware to developing legal technology.

Metasoftware enables users to create the software of their choosing and stands in sharp contrast to traditional, functional. Functional software is the default type of software that is currently produced and includes word processing, email, social networking, enterprise resource management, online marketplaces, and video game software. Metasoftware, by contrast, is not functional. Metasoftware presents the user with a blank slate upon which to build functional software.

I argue that software is metasoftware to that extent that (1) it ...


Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa 2022 St. Mary's University School of Law

Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa

The Scholar: St. Mary's Law Review on Race and Social Justice

Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the ...


Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley 2022 University of Cincinnati College of Law

Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley

University of Cincinnati Law Review

No abstract provided.


Ransomware, Cyber Sanctions, And The Problem Of Timing, Christine Abely 2022 New England Law | Boston

Ransomware, Cyber Sanctions, And The Problem Of Timing, Christine Abely

Boston College Law Review

This essay argues that the lack of a federal blanket prohibition against ransomware payments undermines the purpose and effectiveness of the U.S. sanctions regime. The U.S. cyber-related sanctions program suffers from an essential problem of timing: often payments to malicious cyber actors are not prohibited until those actors have been named to the Specially Designated Nationals and Blocked Persons List (SDN) maintained by the Office of Foreign Assets Control in the U.S. Department of the Treasury. Yet those actors generally are not so designated until they have been identified as malicious through a completed or attempted attack ...


A Hacker “May” Have Accessed Your Data: Can Victims Of Data Breaches Sue Before Alleging Misuse?, John Landzert 2022 Boston College Law School

A Hacker “May” Have Accessed Your Data: Can Victims Of Data Breaches Sue Before Alleging Misuse?, John Landzert

Boston College Law Review

On February 4, 2021, in Tsao v. Captiva MVP Restaurant Partners, LLC, the United States Court of Appeals for the Eleventh Circuit held that the mere existence of a data breach is insufficient to grant plaintiffs standing to sue the company that exposed their personal information. By doing so, the Eleventh Circuit aligned itself with the Second, Third, Fourth, and Eighth Circuits. In contrast, the Sixth, Seventh, Ninth, and D.C. Circuits have granted standing in such cases. This Comment argues that the Eleventh Circuit properly applied Supreme Court jurisprudence at the time it decided Tsao and, in light of ...


Enter The Battleverse: China's Metaverse War, Josh Baughman 2022 University of South Florida

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Dirty Little Secrets: The Constitutional Feasibility Of Implementing Legislation To Compel Licensing Of Trade Secrets To End The Covid-19 Pandemic, Noah Olson 2022 University of Cincinnati College of Law

Dirty Little Secrets: The Constitutional Feasibility Of Implementing Legislation To Compel Licensing Of Trade Secrets To End The Covid-19 Pandemic, Noah Olson

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Losing Dignity: Eroding Privacy Rights Of Immigrants In Technology-Based Immigration Enforcement, Inma Sumaita 2022 University of Cincinnati College of Law

Losing Dignity: Eroding Privacy Rights Of Immigrants In Technology-Based Immigration Enforcement, Inma Sumaita

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Infringement, She Wrote: The Intellectual Property Rights Of Victims In True Crime Craze, Laura Callihan 2022 University of Cincinnati College of Law

Infringement, She Wrote: The Intellectual Property Rights Of Victims In True Crime Craze, Laura Callihan

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


The Patentability Of Inventions With Artificial Intelligence Listed As An Inventor Following Thaler V. Hirshfeld, Kaitlyn Taylor 2022 University of Cincinnati College of Law

The Patentability Of Inventions With Artificial Intelligence Listed As An Inventor Following Thaler V. Hirshfeld, Kaitlyn Taylor

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan 2022 Brooklyn Law School

The "Worst Law In Technology": How The Computer Fraud And Abuse Act Allows Big Businesses To Collect And Sell Your Personal Information, Alicia Nakhjavan

Brooklyn Law Review

For years, big businesses have been collecting and selling users’ personal information without permission. In attempts at preventing this practice, users have brought civil actions under the Computer Fraud and Abuse Act (CFAA), alleging a loss of personal privacy. As currently enacted, “personal privacy” is not included in the statutory definition of loss. Further, courts have been reluctant to interpret the CFAA broadly to cover loss of personal privacy claims. This note proposes that an amendment to the CFAA is necessary to close this gap in the statute’s coverage and better protect users’ right to privacy.


Ayla Llc V. Alya Skin Pty. Ltd., 2021 Wl 38233624 (9th Cir. Aug. 27, 2021), Liya Levin 2022 DePaul University College of Law

Ayla Llc V. Alya Skin Pty. Ltd., 2021 Wl 38233624 (9th Cir. Aug. 27, 2021), Liya Levin

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Andy Warhol Foundation V. Goldsmith, Alyssa Weitkamp 2022 DePaul University College of Law

Andy Warhol Foundation V. Goldsmith, Alyssa Weitkamp

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Google V. Oracle: The Recent Supreme Court Decision, How It Highlights The Inadequacies Of Shoehorning New Technology Into Intellectual Property Law, And Possible Solutions, Claire Price 2022 DePaul University College of Law

Google V. Oracle: The Recent Supreme Court Decision, How It Highlights The Inadequacies Of Shoehorning New Technology Into Intellectual Property Law, And Possible Solutions, Claire Price

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Updating The Section 230 Safe Harbor Provision In A New Age Of Social Media Platforms, Arnold Owusu 2022 DePaul University College of Law

Updating The Section 230 Safe Harbor Provision In A New Age Of Social Media Platforms, Arnold Owusu

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Strategies To Deter Child Pornography In The Absence Of A Mandatory Encryption Back Door: Tipster Programs, A Licensed Researcher System, Compelled Password Production, & Private Surveillance, Anthony Volini, Farzana Ahmed 2022 DePaul University

Strategies To Deter Child Pornography In The Absence Of A Mandatory Encryption Back Door: Tipster Programs, A Licensed Researcher System, Compelled Password Production, & Private Surveillance, Anthony Volini, Farzana Ahmed

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Government, Big Tech, And Individual Liberty, Romaine Miller, Johnny B. Davis 2022 Liberty University

Government, Big Tech, And Individual Liberty, Romaine Miller, Johnny B. Davis

Helm's School of Government Conference

The thesis is that the first principles of the Founding Fathers express in the Declaration give the proper guidance for dealing with the impact of high tech on individual liberty.


Digital Commons powered by bepress