Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3096 Full-Text Articles 2675 Authors 1066644 Downloads 83 Institutions

All Articles in Computer Law

Faceted Search

3096 full-text articles. Page 1 of 76.

Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik 2017 Boston College Law School

Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik

Boston College Law Review

On April 29, 2016, in Yershov v. Gannett Satellite Information Network, Inc. (“Yershov II”), the U.S. Court of Appeals for the First Circuit held that the Video Privacy Protection Act (“VPPA”) of 1988 extended to a free application provider who disclosed its users’ GPS coordinates, phone identification numbers, and video histories to a data analytics company. In a similar case, the U.S. Court of Appeals for the Eleventh Circuit held that the VPPA did not apply because the relationship was too weak to render the user a “subscriber” under the Act. The U.S. Court of Appeals for ...


Will Quants Rule The (Legal) World?, Edward K. Cheng 2017 Brooklyn Law School

Will Quants Rule The (Legal) World?, Edward K. Cheng

Edward Cheng

The quants are coming! And they are here to stay-so argues Professor Ian Ayres' in his new book, Super Crunchers, which details the brave new world of statistical prediction and how it has already begun to affect our lives. For years, academic researchers have known about the considerable and at times surprising advantages of statistical models over the considered judgments of experienced clinicians and experts. Today, these models are emerging all over the landscape. Whether the field is wine, baseball, medicine, or consumer relations, they are vying against traditional experts for control over how we make decisions. To be sure ...


Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green 2017 Boston College Law School

Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green

Boston College Law Review

The increasing digitalization of our personal and professional lives has generated corresponding growth in the amount of electronically stored private information in the hands of third parties. That private information is at risk of theft, loss, or manipulation. Employers that hold employee tax information and merchants that hold significant troves of consumer credit card data are particularly attractive targets. When hackers strike, victims often band together in federal class actions, naming the custodians of their private data as defendants. More and more, however, district courts are dismissing these class action claims at the doorstep for lack of Article III standing ...


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney 2017 Selected Works

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

Keidra Chaney

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study. Web analytics technology ...


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney 2017 Selected Works

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney

Keidra Chaney

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an ...


Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. McKenna 2017 Penn State Law

Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna

Anne T. McKenna

No abstract provided.


Lessons For Policymakers And Regulators On The (Predictable) Future Of The Digital Economy, Kevin Werbach 2017 University of Pennsylvania

Lessons For Policymakers And Regulators On The (Predictable) Future Of The Digital Economy, Kevin Werbach

Penn Wharton Public Policy Initiative

The next stage in the evolution of the digital economy involves the creation of what can be called the “Internet of the World”—an expanding web of transactions, anticipated today by on-demand platforms such as Uber and Airbnb, that eventually will occur across trillions of networked devices and penetrate every sphere of human activity. This brief looks at the many legal questions raised by these novel services, in particular, at the regulatory classification of on-demand services, as well as the application of antitrust provisions, the imposition of taxes and fees, and the assignment of liability to these new platforms.


Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi 2017 John Marshall Law School

Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi

The John Marshall Review of Intellectual Property Law

The prevalence of ad blocking software (software that prevents the loading of web based advertisements) is a growing problem for website owners and content creators who rely on advertising revenue to earn money. While the number of ad block users continues to increase, there has thus far been no significant legal challenge to ad blocking in the United States. This comment examines how a website owner, through a combination of technological improvements and the anti-circumvention provisions of the Digital Millennium Copyright Act, could successfully raise a legal challenge against the purveyors of ad blocking software.


Facilitated Plagiarism: The Saga Of Term-Paper Mills And The Failure Of Legislation And Litigation To Control Them, Darby Dickerson 2016 Selected Works

Facilitated Plagiarism: The Saga Of Term-Paper Mills And The Failure Of Legislation And Litigation To Control Them, Darby Dickerson

Darby Dickerson

No abstract provided.


Rwu First Amendment Blog: David Logan's Blog: When Facts And News Diverge 12-2-2016, David A. Logan 2016 Roger Williams University School of Law

Rwu First Amendment Blog: David Logan's Blog: When Facts And News Diverge 12-2-2016, David A. Logan

Law School Blogs

No abstract provided.


“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts 2016 Brooklyn Law School

“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts

Brooklyn Law Review

Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they ...


The Question Concerning Technology In Compliance, Sean J. Griffith 2016 Brooklyn Law School

The Question Concerning Technology In Compliance, Sean J. Griffith

Brooklyn Journal of Corporate, Financial & Commercial Law

In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.


Like A Bad Neighbor; Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon 2016 Brooklyn Law School

Like A Bad Neighbor; Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon

Brooklyn Journal of Corporate, Financial & Commercial Law

Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information; the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches; based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp.; is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation; causing the FTC to step in and fill the void in regulation. In the absence of congressional ...


Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian 2016 Brooklyn Law School

Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian

Brooklyn Journal of Corporate, Financial & Commercial Law

As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.


The Cybersecurity Threat: Compliance And The Role Of Whistleblowers, Jennifer M. Pacella 2016 Brooklyn Law School

The Cybersecurity Threat: Compliance And The Role Of Whistleblowers, Jennifer M. Pacella

Brooklyn Journal of Corporate, Financial & Commercial Law

In today’s technologically dependent world, concerns about cybersecurity, data breaches, and compromised personal information infiltrate the news almost daily. The Securities and Exchange Commission (SEC) has recently emerged as a regulator that is keenly focused on cybersecurity, specifically with respect to encouraging disclosures in this arena by regulated entities. Although the SEC has issued non-binding “guidance” to help companies navigate their reporting obligations in this sector, the agency lacks binding cybersecurity disclosure regulations as they pertain generally to public companies. Given that the SEC has already relied on such guidance in threatening enforcement actions, reporting companies are increasingly pressured ...


Mitigating Cyber Risk In It Supply Chains, Maureen Wallace 2016 Cleveland-Marshall College of Law

Mitigating Cyber Risk In It Supply Chains, Maureen Wallace

The Global Business Law Review

This note argues that the United States needs to utilize current federal agencies to begin introducing cyber supply chain risk management regulation for IT supply chains. Cyber supply chain risk management is a critical area of cybersecurity that has barely been recognized by the United States government. The globalization of the digital world has introduced a new spectrum of risk management issues that affect the products exchanged by businesses and consumed by individuals and government agencies. While there have been some initiatives toward the promotion of tighter cybersecurity regulation, most initiatives only concern the public sector, leaving the private sector ...


Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim 2016 Boston College Law School

Should Youtube’S Content Id Be Liable For Misrepresentation Under The Digital Millennium Copyright Act?, Laura Zapata-Kim

Boston College Law Review

YouTube has quickly become the dominant player in the Internet video sharing platform market. To keep its leading position, it created an internal automated system to police potential copyright infringements known as Content ID. Generally, that system functions similarly to third-party computer automated systems that send takedown requests, yet it is exempt from liability for removing lawful videos under a safe harbor provided by the Digital Millennium Copyright Act of 1998 (“DMCA”). Although some industry experts first championed Content ID, many now question whether it unfairly favors copyright holders and YouTube itself at the expense of content creators and the ...


Can I Skype My Doctor? Limited Medicare Coverage Hinders Telemedicine’S Potential To Improve Health Care Access, Hana Sahdev 2016 Boston College Law School

Can I Skype My Doctor? Limited Medicare Coverage Hinders Telemedicine’S Potential To Improve Health Care Access, Hana Sahdev

Boston College Law Review

Telemedicine services, such as virtual consultations and remote patient monitoring, are revolutionizing health care delivery. The Patient Protection and Affordable Care Act of 2010 (“ACA”) promotes the use of technology in health care reform as a means to increase quality and access while reducing costs. Despite the excitement around telemedicine, the lack of Medicare reimbursement hinders access and innovation. This Note analyzes the utilization of telemedicine to promote health care access for Medicare beneficiaries, and argues that legislative and regulatory changes are needed to reconcile current Medicare policies with the ACA’s encouragement of using telemedicine services. Specifically, this Note ...


Mobilizing User-Generated Content For Canada’S Digital Content Advantage, Samuel E. Trosow, Jacquelyn Burkell, Nick Dyer-Witheford, Pamela J. McKenzie, Michael B. McNally, Caroline Whippey, Lola Wong 2016 The University of Western Ontario

Mobilizing User-Generated Content For Canada’S Digital Content Advantage, Samuel E. Trosow, Jacquelyn Burkell, Nick Dyer-Witheford, Pamela J. Mckenzie, Michael B. Mcnally, Caroline Whippey, Lola Wong

Jacquelyn Burkell

The goal of the Mobilizing User-Generated Content for Canada’s Digital Content Advantage project is to define User-Generated Content (UGC) in its current state, identify successful models built for UGC, and anticipate barriers and policy infrastructure needed to sustain a model to leverage the further development of UGC to Canada's advantage.

This poster session is based on the report, Mobilizing User-Generated Content For Canada’s Digital Advantage (http://ir.lib.uwo.ca/fimspub/21/) and is related to the Brown Bag presentation also presented on March 23, 2011 (http://ir.lib.uwo.ca/fimspres/11/).


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo 2016 University of Pennsylvania Law School

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the ...


Digital Commons powered by bepress