Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2857 Full-Text Articles 2538 Authors 1034989 Downloads 76 Institutions

All Articles in Computer Law

Faceted Search

2857 full-text articles. Page 1 of 66.

Can I Skype My Doctor? Limited Medicare Coverage Hinders Telemedicine’S Potential To Improve Health Care Access, Hana Sahdev 2016 Boston College Law School

Can I Skype My Doctor? Limited Medicare Coverage Hinders Telemedicine’S Potential To Improve Health Care Access, Hana Sahdev

Boston College Law Review

Telemedicine services, such as virtual consultations and remote patient monitoring, are revolutionizing health care delivery. The Patient Protection and Affordable Care Act of 2010 (“ACA”) promotes the use of technology in health care reform as a means to increase quality and access while reducing costs. Despite the excitement around telemedicine, the lack of Medicare reimbursement hinders access and innovation. This Note analyzes the utilization of telemedicine to promote health care access for Medicare beneficiaries, and argues that legislative and regulatory changes are needed to reconcile current Medicare policies with the ACA’s encouragement of using telemedicine services. Specifically, this Note ...


Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim 2016 Boston College Law School

Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim

Boston College Law Review

YouTube has quickly become the dominant player in the Internet video sharing platform market. To keep its leading position, it created an internal automated system to police potential copyright infringements known as Content ID. Generally, that system functions similarly to third-party computer automated systems that send takedown requests, yet it is exempt from liability for removing lawful videos under a safe harbor provided by the Digital Millennium Copyright Act of 1998 (“DMCA”). Although some industry experts first championed Content ID, many now question whether it unfairly favors copyright holders and YouTube itself at the expense of content creators and the ...


Mobilizing User-Generated Content For Canada’S Digital Content Advantage, Samuel E. Trosow, Jacquelyn Burkell, Nick Dyer-Witheford, Pamela J. McKenzie, Michael B. McNally, Caroline Whippey, Lola Wong 2016 The University of Western Ontario

Mobilizing User-Generated Content For Canada’S Digital Content Advantage, Samuel E. Trosow, Jacquelyn Burkell, Nick Dyer-Witheford, Pamela J. Mckenzie, Michael B. Mcnally, Caroline Whippey, Lola Wong

Jacquelyn Burkell

The goal of the Mobilizing User-Generated Content for Canada’s Digital Content Advantage project is to define User-Generated Content (UGC) in its current state, identify successful models built for UGC, and anticipate barriers and policy infrastructure needed to sustain a model to leverage the further development of UGC to Canada's advantage.

This poster session is based on the report, Mobilizing User-Generated Content For Canada’s Digital Advantage (http://ir.lib.uwo.ca/fimspub/21/) and is related to the Brown Bag presentation also presented on March 23, 2011 (http://ir.lib.uwo.ca/fimspres/11/).


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo 2016 University of Pennsylvania Law School

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the ...


Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll 2016 Villanova University School of Law

Patent Injunctions And The Problem Of Uniformity Cost, Michael W. Carroll

Michael W. Carroll

In eBay v. MercExchange, the Supreme Court correctly rejected a one-size-fits-all approach to patent injunctions. However, the Court's opinion does not fully recognize that the problem of uniformity in patent law is more general and that this problem cannot be solved through case-by-case analysis. This Essay provides a field guide for implementing eBay using functional analysis and insights from a uniformity-cost framework developed more fully in prior work. While there can be no general rule governing equitable relief in patent cases, the traditional four factor analysis for injunctive relief should lead the cases to cluster around certain patterns that ...


Creative Commons And The New Intermediaries, Michael W. Carroll 2016 Villanova University School of Law

Creative Commons And The New Intermediaries, Michael W. Carroll

Michael W. Carroll

This symposium contribution examines the disintermediating and reintermediating roles played by Creative Commons licenses on the Internet. Creative Commons licenses act as a disintermediating force because they enable end-to-end transactions in copyrighted works. The licenses have reintermediating force by enabling new services and new online communities to form around content licensed under a Creative Commons license. Intermediaries focused on the copyright dimension have begun to appear online as search engines, archives, libraries, publishers, community organizers, and educators. Moreover, the growth of machine-readable copyright licenses and the new intermediaries that they enable is part of a larger movement toward a Semantic ...


Introduction, Tracy Mitrano 2016 University of Massachusetts - Amherst

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano 2016 University of Massachusetts - Amherst

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions of public ...


Chapter Four: Information Security, Tracy Mitrano 2016 University of Massachusetts - Amherst

Chapter Four: Information Security, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter One: Free Speech, Tracy Mitrano 2016 University of Massachusetts - Amherst

Chapter One: Free Speech, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Two: Privacy, Tracy Mitrano 2016 University of Massachusetts - Amherst

Chapter Two: Privacy, Tracy Mitrano

Tracy Mitrano

"Free speech" and "privacy" operate as integral, essential supporting values that underpin the missions of colleges and universities in the United States. Chapter One focused attention on free speech. Many of the same arguments could be made by and for privacy. It would be interesting to subject the same content about free speech to a global "find and replace" function for the applicable legal and policy points between them! Nonetheless, US law separates these two areas. Therefore, this chapter will focus on privacy law in particular: government surveillance and consumer privacy. Both subsets of privacy law, I will argue, have ...


Chapter Three: Intellectual Property, Tracy Mitrano 2016 University of Massachusetts - Amherst

Chapter Three: Intellectual Property, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Title Page, Tracy Mitrano 2016 University of Massachusetts - Amherst

Title Page, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Conclusion, Tracy Mitrano 2016 University of Massachusetts - Amherst

Conclusion, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Circumvention Of Geoblocking, Marketa Trimble 2016 University of Nevada, Las Vegas -- William S. Boyd School of Law

Circumvention Of Geoblocking, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble gave her presentation Circumvention of Geoblocking at the "Law, Borders, and Speech" conference, held at Stanford Law School on Oct. 24, 2016.


Pactes D'Actionnaires Et Prévention Des Conflits Dans La Société Anonyme De L'Espace Ohada., Julien Coomlan Hounkpe 2016 University of Abomey Calavi, Benin

Pactes D'Actionnaires Et Prévention Des Conflits Dans La Société Anonyme De L'Espace Ohada., Julien Coomlan Hounkpe

Julien C. Hounkpe

L’expérience enseigne que les pactes d’actionnaires sont le plus souvent méconnus ou insuffisamment utilisés dans les sociétés anonymes en Afrique. Or ces instruments conventionnels permettent de mettre en place un certain nombre de mécanismes qui s’avéreraient efficaces dans la prévention des conflits entre actionnaires dans l’espace OHADA.


Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty 2016 Duke Law

Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty

Duke Law & Technology Review

Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three different analytical and conceptual frameworks while looking at a variety of cyber-attacks along with their subsequent effects. One of the core principles of the law of armed conflict is distinction, which states that civilians in an armed conflict are granted a set of protections, mainly the protection from ...


I Think, Therefore I Invent: Creative Computers And The Future Of Patent Law, Ryan Abbott 2016 University of Surrey School of Law

I Think, Therefore I Invent: Creative Computers And The Future Of Patent Law, Ryan Abbott

Boston College Law Review

Artificial intelligence has been generating inventive output for decades, and now the continued and exponential growth in computing power is poised to take creative machines from novelties to major drivers of economic growth. In some cases, a computer’s output constitutes patentable subject matter, and the computer rather than a person meets the requirements for inventorship. Despite this, and despite the fact that the Patent Office has already granted patents for inventions by computers, the issue of computer inventorship has never been explicitly considered by the courts, Congress, or the Patent Office. Drawing on dynamic principles of statutory interpretation and ...


A Second Bite At The Apple: Federal Courts’ Authority To Compel Technical Assistance To Government Agents In Accessing Encrypted Smartphone Data Under The All Writs Act, John L. Potapchuk 2016 Boston College Law School

A Second Bite At The Apple: Federal Courts’ Authority To Compel Technical Assistance To Government Agents In Accessing Encrypted Smartphone Data Under The All Writs Act, John L. Potapchuk

Boston College Law Review

On February 29, 2016, in In re Order Requiring Apple, Inc. Assist in Execution of Search Warrant (“In re Apple, Inc.”) the U.S. District Court for the Eastern District of New York held that the All Writs Act did not provide the legal authority to require Apple Inc. to bypass the encrypted lock-screen passcode of an iPhone for the federal government in order to execute a search warrant. Accordingly, the decision, which was the first of its kind, stripped the government of an investigative tool upon which it had routinely relied since as early as 2008. In In re ...


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman 2016 Roger Williams University School of Law

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Digital Commons powered by bepress