Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, 2019 Seattle University School of Law
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Privacy Statements Under The Gdpr, 2019 Seattle University School of Law
Privacy Statements Under The Gdpr, Mike Hintze
Seattle University Law Review
The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …
Regulating The Gdpr: Perspectives From The United Kingdom, 2019 Seattle University School of Law
Regulating The Gdpr: Perspectives From The United Kingdom, Hannah Mccausland
Seattle University Law Review
Hannah McCausland leads the international group at the UK Information Commissioner’s Office (ICO). The ICO’s International Engagement functions as the gateway to other data protection and privacy authorities on international matters. She’s involved in the work of the EU European Data Protection Board advising the commissioner and the deputy commissioner on international positioning of the ICO, and she has played a key role over the past six years in the ICO’s strategy on navigating the EU’s data protection framework. Hannah has also played a major role at the global level and advancing the practical tools that data protection and privacy …
Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, 2019 Seattle University School of Law
Privacy, Freedom, And Technology—Or “How Did We Get Into This Mess?”, Alex Alben
Seattle University Law Review
Can we live in a free society without personal privacy? The question is worth pondering, not only in light of the ongoing debate about government surveillance of private communications, but also because new technologies continue to erode the boundaries of our personal space. This Article examines our loss of freedom in a variety of disparate contexts, all connected by the thread of erosion of personal privacy. In the scenarios explored here, privacy reducing activities vary from government surveillance, personal stalking conducted by individuals, and profiling by data-driven corporations, to political actors manipulating social media platforms. In each case, new technologies …
Trademark Issues Relating To Digitalized Flavor, 2019 University of Louisville School of Law
Trademark Issues Relating To Digitalized Flavor, John T. Cross
John Cross
Over the past three decades, most people have become accustomed to dealing with music, film, photography, and other expressive media stored in digital format. However, while great strides have been made in digitalizing what we see and hear, there has been far less progress in digitalizing the other senses. This lack of progress is especially evident for the chemical senses of smell and taste. However, all this may soon change. Recently, several groups of researchers have commenced various projects that could store odors and flavors in a digital format, and replicate them for humans.
Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), 2019 Selected Works
Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross
John Cross
This article discusses the process of innovation and releasing so-called negative information to help others in the process to innovate. The article focuses on patent law and asks the questions: Why do people innovate? Does the legal system really reflect how the process of innovation actually occurs?
Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), 2019 Selected Works
Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross
John Cross
Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is …
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, 2019 Elisabeth Haub School of Law at Pace University
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
Pace Law Review
The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …
Platforms, The First Amendment And Online Speech: Regulating The Filters, 2019 Pace University
Platforms, The First Amendment And Online Speech: Regulating The Filters, Sofia Grafanaki
Pace Law Review
In recent years, online platforms have given rise to multiple discussions about what their role is, what their role should be, and whether they should be regulated. The complex nature of these private entities makes it very challenging to place them in a single descriptive category with existing rules. In today’s information environment, social media platforms have become a platform press by providing hosting as well as navigation and delivery of public expression, much of which is done through machine learning algorithms. This article argues that there is a subset of algorithms that social media platforms use to filter public …
Debugging The Tallinn Manual 2.0'S Application Of The Due Diligence Principle To Cyber Operations, 2019 University of Washington School of Law
Debugging The Tallinn Manual 2.0'S Application Of The Due Diligence Principle To Cyber Operations, Colin Patrick
Washington International Law Journal
As global cyber connectivity increases, so does opportunities for large-scale nefarious cyber operations. These novel circumstances have necessitated the application of old-world customs to an increasingly complex world. To meet this challenge, the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations was created. The Manual provides 154 black letter rules detailing how international law applies to cyber operations during peacetime. Of particular import is the Manual’s interpretation of the due diligence principle. This principle, which defines the contours of a state’s obligation to prevent their territory to inflict extraterritorial harm, is increasingly significant in light of the …
Bone Crusher 2.0: The Fourth Annual Greg Lastowka Memorial Lecture, 2019 Cornell Law School
Bone Crusher 2.0: The Fourth Annual Greg Lastowka Memorial Lecture, James Grimmelmann
Cornell Law Faculty Publications
No abstract provided.
Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, 2019 University of Maryland Francis King Carey School of Law
Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger
Maryland Law Review
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch.
Cybersecurity Oversight Liability, 2019 University of Nevada, Las Vegas William S. Boyd School of Law
Cybersecurity Oversight Liability, Benjamin P. Edwards
Georgia State University Law Review
A changing cybersecurity environment now poses a significant corporate-governance challenge. Although some cybersecurity data breaches may be inevitable, courts now increasingly consider when a corporation’s officers and directors may be held liable on theories that they acted in bad faith and failed to adequately oversee the corporation’s affairs. This short essay reviews recent derivative decisions and encourages corporate boards to recognize that in an environment filled with increasing threats, a reasonable response will require devoting real resources and attention to cybersecurity issues.
Online Terms As In Terrorem Devices, 2019 University of Maryland Francis King Carey School of Law
Online Terms As In Terrorem Devices, Colin P. Marks
Maryland Law Review
Online shopping has quickly replaced the brick-and-mortar experience for a large portion of the consuming public. The online transaction itself is rote: browse items, add them to your cart, and check out. Somewhere along the way, the consumer is likely made aware of (or at least exposed to) the merchant’s terms and conditions, via either a link or a pop-up box. Such terms and conditions have become so ubiquitous that most consumers would be hard-pressed to find a merchant that doesn’t try to impose them somewhere on their website. Though such terms and conditions are pervasive, most consumers do not …
Front Matter, 2019 Embry-Riddle Aeronautical University
Digital Forensics, A Need For Credentials And Standards, 2019 University of Baltimore
Digital Forensics, A Need For Credentials And Standards, Nima Zahadat
Journal of Digital Forensics, Security and Law
The purpose of the conducted study was to explore the credentialing of digital forensic investigators, drawing from applicable literature. A qualitative, descriptive research design was adopted which entailed searching across Google Scholar and ProQuest databases for peer reviewed articles on the subject matter. The resulting scholarship was vetted for timeliness and relevance prior to identification of key ideas on credentialing. The findings of the study indicated that though credentialing was a major issue in digital forensics with an attentive audience of stakeholders, it had been largely overshadowed by the fundamental curricula problems in the discipline. A large portion of research …
Topic Modeling The President: Conventional And Computational Methods, 2019 New York University
Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan
J.B. Ruhl
Legal and policy scholars modeling direct actions into substantive topic classifications thus far have not employed computational methods. To compare the results of their conventional modeling methods with the computational method, we generated computational topic models of all direct actions over time periods other scholars have studied using conventional methods, and did the same for a case study of environmental-policy direct actions. Our computational model of all direct actions closely matched one of the two comprehensive empirical models developed using conventional methods. By contrast, our environmental-case-study model differed markedly from the only empirical topic model of environmental-policy direct actions using …
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, 2019 Washington and Lee University School of Law
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …
Crashworthy Code, 2019 University of Washington School of Law
Crashworthy Code, Bryan H. Choi
Washington Law Review
Code crashes. Yet for decades, software failures have escaped scrutiny for tort liability. Those halcyon days are numbered: self-driving cars, delivery drones, networked medical devices, and other cyber-physical systems have rekindled interest in understanding how tort law will apply when software errors lead to loss of life or limb. Even after all this time, however, no consensus has emerged. Many feel strongly that victims should not bear financial responsibility for decisions that are entirely automated, while others fear that cyber-physical manufacturers must be shielded from crushing legal costs if we want such companies to exist at all. Some insist the …
Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, 2019 Vanderbilt University Law School
Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer
Vanderbilt Journal of Entertainment & Technology Law
The digital era provides many opportunities, yet it also presents several unique challenges with regard to cybersecurity and the protection of digital assets. Cybercrime has changed the international legal landscape as nations, businesses, and legislators grapple with how to deal with this rapidly evolving, multifaceted problem. As there is no international mechanism for protection of foreign investors in this regard, some scholars are advocating for the use of Bilateral Investment Treaties (BITs) as part of a 'olycentric" approach to cyber peace. With an uptick in digital development and more development on the horizon, it will be important to establish what …