Retrievable Images On Social Media Platforms: A Call For A New Privacy Tort, 2020 Harvard Law School
Retrievable Images On Social Media Platforms: A Call For A New Privacy Tort, Zahra Takhshid
Buffalo Law Review
No abstract provided.
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, 2020 Seattle University School of Law
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
A Dangerous Inheritance: A Child’S Digital Identity, 2020 Seattle University School of Law
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
In Memory Of Professor James E. Bond, 2020 Seattle University School of Law
In Memory Of Professor James E. Bond, Janet Ainsworth
Seattle University Law Review
Janet Ainsworth, Professor of Law at Seattle University School of Law: In Memory of Professor James E. Bond.
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, 2020 Dalhousie University Schulich School of Law
Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn
Articles, Book Chapters, & Popular Press
Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …
Legal Risks Of Adversarial Machine Learning Research, 2020 Microsoft Corporation
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Articles, Book Chapters, & Popular Press
Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.
Now, research on adversarial …
Politics Of Adversarial Machine Learning, 2020 Harvard Law School
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
The Ouster Of Parliamentary Sovereignty?, 2020 Singapore Management University
The Ouster Of Parliamentary Sovereignty?, Benjamin Joshua Ong
Research Collection Yong Pung How School Of Law
The Regulation of Investigatory Powers Act 2000 (“RIPA”) establishes the Investigatory Powers Tribunal (“IPT”), which hears complaints relating to surveillance activities by public authorities. The Supreme Court case of R (Privacy International) v Investigatory Powers Tribunal (“Privacy International”) concerned the Secretary of State’s power under section 5 of the Intelligence Services Act 1994 to issue a warrant authorising MI5, MI6, or GCHQ to enter or interfere with property “specified” in the warrant. The IPT had to decide whether it was lawful for the Secretary of State to issue a warrant in respect of a class of property (sometimes known as …
A New Frontier Facing Attorneys And Paralegals: The Promise & Challenges Of Artificial Intelligence As Applied To Law & Legal Decision-Making, 2020 CUNY New York City College of Technology
A New Frontier Facing Attorneys And Paralegals: The Promise & Challenges Of Artificial Intelligence As Applied To Law & Legal Decision-Making, Marissa Moran
Publications and Research
Artificial Intelligence/AI invisibly navigates and informs our lives today and may also be used to determine a client’s legal fate. Through executive order, statements by a U.S. Supreme Court justice and a Congressional Commission on AI, all three branches of the United States government have addressed the use of AI to resolve societal and legal matters. Pursuant to the American Bar Association Model Rules of Professional Conduct[i] and New York Rules of Professional Conduct (NYRPC), [ii] the legal profession recognizes the need for competency in technology which requires both substantive knowledge of law and competent use of technology for …
Saving The Electronic Person From Digital Assault: The Case For More Robust Protections Over Our Electronic Medical Records, 2020 Duquesne University
Saving The Electronic Person From Digital Assault: The Case For More Robust Protections Over Our Electronic Medical Records, Danielle M. Mrdjenovich
Duquesne Law Review
No abstract provided.
Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, 2020 Purdue University
Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam
Faculty Publications
In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …
The Old Bailment Doctrine: The Answer To Fourth Amendment Jurisprudence In The Digital Age, 2020 Candidate for Juris Doctor, Roger Williams University School of Law,2020
The Old Bailment Doctrine: The Answer To Fourth Amendment Jurisprudence In The Digital Age, Shane Gallant
Roger Williams University Law Review
No abstract provided.
Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, 2020 Tufts University
Examining The Anomalies, Explaining The Value: Should The Usa Freedom Act’S Metadata Program Be Extended?, Susan Landau, Asaf Lubin
Articles by Maurer Faculty
Edward Snowden’s disclosure of National Security Agency (“NSA”) bulk collection of communications metadata was a highly disturbing shock to the American public. The intelligence community was surprised by the response, as it had largely not anticipated a strong negative public reaction to this surveillance program. Controversy over the bulk metadata collection led to the 2015 passage of the USA FREEDOM Act. The law mandated that the intelligence community would collect the Call Detail Records (“CDR”) from telephone service providers in strictly limited ways, not in bulk, and only under order from the Foreign Intelligence Surveillance Court. The new program initially …
Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), 2020 Boston University School of Law
Cyber Mobs, Disinformation, And Death Videos: The Internet As It Is (And As It Should Be), Danielle K. Citron
Faculty Scholarship
Fiction and visual representations can alter our understanding of human experiences and struggles. They help us understand human frailties and suffering in a visceral way. Nick Drnaso’s graphic novel Sabrina does that in spades. In Sabrina, a woman is murdered by a misogynist, and a video of her execution is leaked. Conspiracy theorists deem her murder a hoax. A cyber mob smears the woman’s loved ones as crisis actors, posts death threats, and spreads their personal information. The attacks continue until a shooting massacre redirects the cyber mob’s wrath to other mourners. Sabrina captures the breathtaking velocity of disinformation online …
A Recent Renaissance In Privacy Law, 2020 University of Colorado Law School
A Recent Renaissance In Privacy Law, Margot Kaminski
Publications
Considering the recent increased attention to privacy law issues amid the typically slow pace of legal change.
Are Data Privacy Laws Trade Barriers?, 2020 University of Colorado Law School
Are Data Privacy Laws Trade Barriers?, Margot Kaminski
Publications
No abstract provided.
Do You Accept These Cookies? How The General Data Protection Regulation Keeps Consumer Information Safe, 2020 Northwestern Pritzker School of Law
Do You Accept These Cookies? How The General Data Protection Regulation Keeps Consumer Information Safe, Jayne Chorpash
Northwestern Journal of International Law & Business
Abstract:
This note examines the General Data Protection Regulation implemented in the EU in 2018. The GDPR was the result of a long history of data privacy laws that have been met with varying levels of success. While the GDPR has retained many characteristics that have made past privacy laws successful, it has also made some important changes. Most notably, the GDPR gives generous rights to consumers to guard and protect their data, which is of growing concern in light of how easy it is to share information in our modern age. Additionally, the GDPR has a much broader territorial …
Table Of Contents, 2020 Seattle University School of Law
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Law Of The Tetrapods, 2020 Vanderbilt University Law School
The Law Of The Tetrapods, Henry T. Greely
Vanderbilt Journal of Entertainment & Technology Law
Should there be such a thing as "Technology Law"? This Article explores that question in two ways. It first looks at four substantive issues that appear across many different areas of technology law: privacy, security, property, and responsibility. It then examines five questions that frequently recur about how to regulate very different new technologies. These questions include which agency should regulate, whether regulation should focus on before or after marketing, what jurisdiction should regulate, how relevant new information will be gained and used, and how-politically-good regulation can be enacted. This Article concludes that it may make sense to develop a …
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, 2020 Boston University School of Law
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks
Faculty Scholarship
A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …