Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,590 Full-Text Articles 4,395 Authors 3,876,593 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,590 full-text articles. Page 56 of 144.

United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko 2018 Concordia University School of Law

United States V. Hubbell: Encryption And The Discovery Of Documents, Gregory S. Sergienko

Greg Sergienko

Five years ago, in a contribution to these pages, I suggested that the Supreme Court's oldest precedents and the original intent of the framers of the Constitution precluded the use of evidence produced under a grant of immunity against the producer, even though the material produced included documents that the producer had not been compelled to write. This implied that information concealed with a cryptographic key could not be used in a criminal prosecution against someone from whom the key had been obtained under a grant of immunity. The issue, however, was doubtful given the tendency of the Court to …


Self Incrimination And Cryptographic Keys, Gregory S. Sergienko 2018 Concordia University School of Law

Self Incrimination And Cryptographic Keys, Gregory S. Sergienko

Greg Sergienko

Modern cryptography can make it virtually impossible to decipher documents without the cryptographic key thus making the availability of the contents of those documents depend on the availability of the key. This article examines the Fourth and Fifth Amendments' protection against the compulsory production of the key and the scope of the Fifth Amendment immunity against compelled production. After analyzing these questions using prevailing Fourth and Fifth Amendment jurisprudence, I shall describe the advantages of a privacy-based approach in practical and constitutional terms. [excerpt]


Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer 2018 Duke Law

Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer

Duke Law & Technology Review

The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership …


Lsat Practicum: An Application Of Human Based Computation, Seth Rivett 2018 Olivet Nazarene University

Lsat Practicum: An Application Of Human Based Computation, Seth Rivett

Student Scholarship – Computer Science

Human-based computation can be applied to solve problems too hard for a single computer. Crowdsourcing can be applied to ethical modeling by splitting ethical situations among humans. In this senior research project, the crowdsourcing method is applied to produce an ethical model for what web crawlers are allowed to do on websites. By evaluating questions about terms of use on a website, users provide context for the robots. An obstacle to this project is getting the right crowd to participate in the problem. The crowd of potential law students was selected as students typically answer questions to study for a …


By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson 2018 Texas A&M University School of Law

By Reading This Title, You Have Agreed To Our Terms Of Service, Brian Larson

Brian Larson

By June of 2017, Facebook had two billion (that’s billion, with a ‘b’) users accessing it per month (Balakrishnan 2017). Facebook believes that each of those consumer end-users is bound by its end-user license agreement (EULA), which Facebook calls a “Statement of Rights and Responsibilities,” available to end-users from a small link in light gray text called “Terms” on every Facebook page. EULAs like this, associated with websites, mobile apps, and consumer goods with embedded software, and styled “terms of service,” “terms of use,” etc., may purport to impose a wide variety of contractual obligations on consumers, for example depriving …


Tax Compliance In A Decentralizing Economy, Manoj Viswanathan 2018 University of California Hastings College of Law

Tax Compliance In A Decentralizing Economy, Manoj Viswanathan

Georgia State University Law Review

Tax compliance in the United States has long relied on information from centralized intermediaries—the financial institutions,employers, and brokers that help ensure income is reported and taxes are paid. Yet while the IRS remains tied to these centralized entities,consumers and businesses are not. New technologies, such as sharing economy platforms (companies such as Airbnb, Uber, and Instacart)and the blockchain (the platform on which various cryptocurrencies are based) are providing new, decentralized options for exchanging goods and services.

Without legislative and agency intervention, these technologies pose a critical threat to the reporting system underlying domestic and international tax compliance. Until now, legal …


Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina 2018 Perm State University

Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina

Journal of Digital Forensics, Security and Law

The authors analyze the selection of preventive measures in the form of house arrest in Russian criminal procedures on the basis of universal and European standards of guaranteeing respect for individual rights. The article states that the application of preventive measures significantly restricts the right to protect the dignity of the individual, the right to freedom and personal inviolability, the right to free movement, choose the place of residence. The authors argue for the alternative method of applying the house arrest. as a form of prevention This preventive measure, unlike detention does not provide for the isolation of a person …


Back Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris 2018 Duke Law School

Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris

Duke Law & Technology Review

The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be …


Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan 2018 University of Massachusetts School of Law

Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan

University of Massachusetts Law Review

Technology has seen a boom over the last few decades, making innovative leaps that border on science fiction. With the most recent technological leap came a new frontier of intellectual property and birthed a new class of criminal: the cyber-pirate. This Article discusses cyber-piracy and its interactions and implications for modern United States copyright law. The Article explains how copyright law, unprepared for the boom, struggled to adapt as courts reconciled the widely physical perceptions of copyright with the digital information being transferred between billions of users instantaneously. The Article also explores how cyber-piracy has made, and continues to make, …


Speech V. Speakers, Thomas E. Kadri 2018 University of Georgia School of Law

Speech V. Speakers, Thomas E. Kadri

Popular Media

Twitter's new rules about extremist speech blur the lines between people and words.


Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong 2018 Professor of Law, University of Cincinnati College of Law

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Faculty Articles and Other Publications

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive copyright protection …


Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer 2018 American University Washington College of Law

Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer

American University Law Review

No abstract provided.


Front Matter, 2018 Southern Methodist University

Front Matter

SMU Science and Technology Law Review

No abstract provided.


Social Media And The Government: Why It May Be Unconstitutional For Government Officials To Moderate Their Social Media, Alex Hadjian 2018 Loyola Law School, Los Angeles

Social Media And The Government: Why It May Be Unconstitutional For Government Officials To Moderate Their Social Media, Alex Hadjian

Loyola of Los Angeles Law Review

No abstract provided.


Common Carriage’S Domain, Christopher S. Yoo 2018 University of Pennsylvania Carey Law School

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall 2018 UIC School of Law

Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall

UIC John Marshall Journal of Information Technology & Privacy Law

Social media is about sharing information. If you are a parent, often the tendency is to relate every aspect of your children’s lives. Most of the time, children do not consent to postings about them and will have a permanent digital shadow created by their parents that follows them the rest of their lives. The purpose of this article is to analyze the current status and potential future of children’s online privacy from a comparative legal approach, highlighting recent case law in the United Kingdom, which is trending toward carving out special privacy rights for children. This contrasts with the …


Are “Evan’S Law” And The Textalyzer Immediate Solutions To Today’S Rapid Changes In Technology Or Encroachments On Drivers’ Privacy Rights?, 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018), Aggie Baumert 2018 UIC School of Law

Are “Evan’S Law” And The Textalyzer Immediate Solutions To Today’S Rapid Changes In Technology Or Encroachments On Drivers’ Privacy Rights?, 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018), Aggie Baumert

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Digital Commons powered by bepress