Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 55

Full-Text Articles in Law

Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske Nov 2023

Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske

Vanderbilt Journal of Entertainment & Technology Law

This Article responds to the call in technology law literature for high-level frameworks to guide regulation of the development and use of Artificial Intelligence (AI) technologies. Accordingly, it adapts a generalized form of the fintech Innovation Trilemma framework to argue that a regulatory scheme can prioritize only two of three aims when considering AI oversight: (1) promoting innovation, (2) mitigating systemic risk, and (3) providing clear regulatory requirements. Specifically, this Article expressly connects legal scholarship to research in other fields focusing on foundation model AI systems and explores this kind of system’s implications for regulation priorities from the geopolitical and …


A Compulsory Solution To The Machine Problem: Recognizing Artificial Intelligence As Inventors In Patent Law, Cole G. Merritt Mar 2023

A Compulsory Solution To The Machine Problem: Recognizing Artificial Intelligence As Inventors In Patent Law, Cole G. Merritt

Vanderbilt Journal of Entertainment & Technology Law

Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.

To embrace the development and power of AI, Congress …


The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby Feb 2023

The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby

Vanderbilt Journal of Entertainment & Technology Law

A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …


The Death Of The Legal Subject, Katrina Geddes Feb 2023

The Death Of The Legal Subject, Katrina Geddes

Vanderbilt Journal of Entertainment & Technology Law

The law is often engaged in prediction. In the calculation of tort damages, for example, a judge will consider what the tort victim’s likely future earnings would have been, but for their particular injury. Similarly, when considering injunctive relief, a judge will assess whether the plaintiff is likely to suffer irreparable harm if a preliminary injunction is not granted. And for the purposes of a child custody evaluation, a judge will consider which parent will provide an environment that is in the best interests of the child.

Relative to other areas of law, criminal law is oversaturated with prediction. Almost …


Human-Centered Design To Address Biases In Artificial Intelligence, Ellen W. Clayton, You Chen, Laurie L. Novak, Shilo Anders, Bradley Malin Feb 2023

Human-Centered Design To Address Biases In Artificial Intelligence, Ellen W. Clayton, You Chen, Laurie L. Novak, Shilo Anders, Bradley Malin

Vanderbilt Law School Faculty Publications

The potential of artificial intelligence (AI) to reduce health care disparities and inequities is recognized, but it can also exacerbate these issues if not implemented in an equitable manner. This perspective identifies potential biases in each stage of the AI life cycle, including data collection, annotation, machine learning model development, evaluation, deployment, operationalization, monitoring, and feedback integration. To mitigate these biases, we suggest involving a diverse group of stakeholders, using human-centered AI principles. Human-centered AI can help ensure that AI systems are designed and used in a way that benefits patients and society, which can reduce health disparities and inequities. …


Returning Integrated Genomic Risk And Clinical Recommendations: The Emerge Study, Ellen W. Clayton, Jodell E. Linder, Aimee Allworth, Sara T. Bland, 100 Others... Jan 2023

Returning Integrated Genomic Risk And Clinical Recommendations: The Emerge Study, Ellen W. Clayton, Jodell E. Linder, Aimee Allworth, Sara T. Bland, 100 Others...

Vanderbilt Law School Faculty Publications

The potential of artificial intelligence (AI) to reduce health care disparities and inequities is recognized, but it can also exacerbate these issues if not implemented in an equitable manner. This perspective identifies potential biases in each stage of the AI life cycle, including data collection, annotation, machine learning model development, evaluation, deployment, operationalization, monitoring, and feedback integration. To mitigate these biases, we suggest involving a diverse group of stakeholders, using human-centered AI principles. Human-centered AI can help ensure that AI systems are designed and used in a way that benefits patients and society, which can reduce health disparities and inequities. …


The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


The Law And Politics Of Ransomware, Asaf Lubin Nov 2022

The Law And Politics Of Ransomware, Asaf Lubin

Vanderbilt Journal of Transnational Law

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …


Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee May 2022

Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee

Vanderbilt Journal of Transnational Law

This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. The two laws both converge and diverge. Their convergences include the stringent regulation of banned acts, network operators, critical infrastructure, data localization, and personal data. These are all shaped by the immediate diffusion of China's Cybersecurity Law in Vietnam and broader structural factors: namely, the common features of the socialist state, socialist legality, and the statist approach to human rights. The foundational divergence is between the Chinese notion of cybersecurity sovereignty and the Vietnamese notion of national cyberspace, which is …


Ai Derivatives: The Application To The Derivative Work Right To Literary And Artistic Productions Of Ai Machines, Daniel J. Gervais Feb 2022

Ai Derivatives: The Application To The Derivative Work Right To Literary And Artistic Productions Of Ai Machines, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

This Article predicts that there will be attempts to use courts to try to broaden the derivative work right in litigation either to prevent the use of, or claim protection for, literary and artistic productions made by Artificial Intelligence (AI) machines. This Article considers the normative valence of, and the (significant) doctrinal pitfalls associated with, such attempts. It also considers a possible legislative alternative, namely attempts to introduce a new sui generis right in AI productions. Finally, this Article explains how, whether such attempts succeed or not, the debate on rights (if any) in productions made by AI machines is …


A Compulsory Solution To The Machine Problem, Cole G. Merritt Jan 2022

A Compulsory Solution To The Machine Problem, Cole G. Merritt

Vanderbilt Law School Faculty Publications

Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.

To embrace the development and power of AI, Congress …


“Computer Says No!”: The Impact Of Automation On The Discretionary Power Of Public Officers, Doa A. Elyounes Jan 2021

“Computer Says No!”: The Impact Of Automation On The Discretionary Power Of Public Officers, Doa A. Elyounes

Vanderbilt Journal of Entertainment & Technology Law

The goal of this Article is to unpack the “human in the loop” requirement in the process of automation. It will analyze the impact of automation on street-level bureaucrats and lay out the steps policy makers need to take into account to ensure that meaningful human discretion is maintained. This issue is examined by comparing two algorithms related to the use of automation to detect and investigate fraud in welfare benefits. The first algorithm is used by Michigan’s Unemployment Insurance Agency for detecting and investigating unemployment fraud. This is a draconian algorithm with the ability to automatically decide to cut …


Algorithmic Opacity, Private Accountability, And Corporate Social Disclosure In The Age Of Artificial Intelligence, Sylvia Lu Dec 2020

Algorithmic Opacity, Private Accountability, And Corporate Social Disclosure In The Age Of Artificial Intelligence, Sylvia Lu

Vanderbilt Journal of Entertainment & Technology Law

Today, firms develop machine-learning algorithms to control human decisions in nearly every industry, creating a structural tension between commercial opacity and democratic transparency. In many of their commercial applications, advanced algorithms are technically complicated and privately owned, which allows them to hide from legal regimes and prevents public scrutiny. However, they may demonstrate their negative effects—erosion of democratic norms, damages to financial gains, and extending harms to stakeholders—without warning. Nevertheless, because the inner workings and applications of algorithms are generally incomprehensible and protected as trade secrets, they can be completely shielded from public surveillance. One of the solutions to this …


The Machine As Author, Daniel J. Gervais Jan 2020

The Machine As Author, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

Machines are increasingly good at emulating humans and laying siege to what has been a strictly human outpost: intellectual creativity.

At this juncture, we cannot know with certainty how high machines will reach on the creativity ladder when compared to, or measured against, their human counterparts, but we do know this. They are far enough already to force us to ask a genuinely hard and complex question, one that intellectual property (“IP”) scholars and courts will need to answer soon; namely, whether copyrights should be granted to productions made not by humans but by machines.

This Article’s specific objective is …


Fintech And International Financial Regulation, Yesha Yadav Jan 2020

Fintech And International Financial Regulation, Yesha Yadav

Vanderbilt Law School Faculty Publications

This Article shows that fintech exacerbates the difficulties of standard setting in international financial regulation. Earlier work introduced the "Innovation Trilemma" (the Trilemma). When seeking to balance the goals of achieving market integrity and innovation through clear and simple rulemaking, regulators can-at best-achieve only two out of these three objectives. Fintech's unique characteristics- a reliance on automation and artificial intelligence, novel types of big data, as well as the use of disintermediating financial supply chains comprising a mix of traditional firms as well as technology specialists and newcomers-complicates the application of the Trilemma. Rulemaking struggles to achieve needed clarity where …


People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke Jan 2020

People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke

Vanderbilt Journal of Entertainment & Technology Law

Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act') imposes conspicuous disclosure requirements …


The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz Jan 2020

The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz

Vanderbilt Journal of Entertainment & Technology Law

A new form of blockchain governance involving the use of formal games that incentivize participants to identify focal resolutions to normative questions is emerging. This symposium contribution provides a brief survey of the literature proposing and critiquing the use of such mechanisms of decentralized decision-making, and it evaluates early laboratory and real-world experiments with this approach.


Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer Mar 2019

Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer

Vanderbilt Journal of Entertainment & Technology Law

The digital era provides many opportunities, yet it also presents several unique challenges with regard to cybersecurity and the protection of digital assets. Cybercrime has changed the international legal landscape as nations, businesses, and legislators grapple with how to deal with this rapidly evolving, multifaceted problem. As there is no international mechanism for protection of foreign investors in this regard, some scholars are advocating for the use of Bilateral Investment Treaties (BITs) as part of a 'olycentric" approach to cyber peace. With an uptick in digital development and more development on the horizon, it will be important to establish what …


Exploring The Interfaces Between Big Data And Intellectual Property Law, Daniel J. Gervais Jan 2019

Exploring The Interfaces Between Big Data And Intellectual Property Law, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

This article reviews the application of several IP rights (copyright, patent, sui generis database right, data exclusivity and trade secret) to Big Data. Beyond the protection of software used to collect and process Big Data corpora, copyright’s traditional role is challenged by the relatively unstructured nature of the non-relational (noSQL) databases typical of Big Data corpora. This also impacts the application of the EU sui generis right in databases. Misappropriation (tort-based) or anti-parasitic behaviour protection might apply, where available, to data generated by AI systems that has high but short-lived value. Copyright in material contained in Big Data corpora must …


Neuroscience, Artificial Intelligence, And The Case Against Solitary Confinement, Francis X. Shen Jan 2019

Neuroscience, Artificial Intelligence, And The Case Against Solitary Confinement, Francis X. Shen

Vanderbilt Journal of Entertainment & Technology Law

Prolonged solitary confinement remains in widespread use in the United States despite many legal challenges. A difficulty when making the legal case against solitary confinement is proffering sufficiently systematic and precise evidence of the detrimental effects of the practice on inmates' mental health. Given this need for further evidence, this Article explores how neuroscience and artificial intelligence (AI) might provide new evidence of the effects of solitary confinement on the human brain.

This Article argues that both neuroscience and AI are promising in their potential ability to present courts with new types of evidence on the effects of solitary confinement …


Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Vanderbilt Law Review

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan Jan 2018

Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan

Vanderbilt Law School Faculty Publications

Legal and policy scholars modeling direct actions into substantive topic classifications thus far have not employed computational methods. To compare the results of their conventional modeling methods with the computational method, we generated computational topic models of all direct actions over time periods other scholars have studied using conventional methods, and did the same for a case study of environmental-policy direct actions. Our computational model of all direct actions closely matched one of the two comprehensive empirical models developed using conventional methods. By contrast, our environmental-case-study model differed markedly from the only empirical topic model of environmental-policy direct actions using …


Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan Jan 2018

Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan

Vanderbilt Journal of Entertainment & Technology Law

Differential privacy is a formal mathematical framework for quantifying and managing privacy risks. It provides provable privacy protection against a wide range of potential attacks, including those currently unforeseen. Differential privacy is primarily studied in the context of the collection, analysis, and release of aggregate statistics. These range from simple statistical estimations, such as averages, to machine learning. Tools for differentially private analysis are now in early stages of implementation and use across a variety of academic,industry, and government settings. Interest in the concept is growing among potential users of the tools, as well as within legal and policy communities, …


Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla Jan 2018

Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla

Vanderbilt Journal of Entertainment & Technology Law

Cyberattacks are occurring at an accelerating pace. Foreign nations are increasingly utilizing hacking as a tool for economic gain, acts of aggression, or international political expression. At risk are US consumers'personal data, private firms' bottom line, and the economies'integrity. In response, federal and state lawmakers have issued a series of disparate, uncoordinated policies seeking to strengthen cybersecurity practices. However, recent events indicate that these policies are less than ideal. This Note suggests that a unified response to cybersecurity is required and calls for the establishment of a single, central federal agency with authority over all cybersecurity regulations. Such an agency …


Virtual Reality Exceptionalism, Gilad Yadin Jan 2018

Virtual Reality Exceptionalism, Gilad Yadin

Vanderbilt Journal of Entertainment & Technology Law

Virtual reality is here. In just a few years, the technology moved from science fiction to the Internet, from specialized research facilities to living rooms. These new virtual reality environments are connected, collaborative, and social-built to deliver a subjective psychological effect that believably simulates spatial physical reality. Cognitive research shows that this effect is powerful enough that virtual reality users act and interact in ways that mirror real-world social and moral norms and behavior.

Contemporary cyberlaw theory is largely based on the notion that cyberspace is exceptional enough to warrant its own specific rules. This premise, a descendant of early …


The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian Jan 2018

The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian

Vanderbilt Journal of Entertainment & Technology Law

The advent of sophisticated artificial intelligence (AI) agents, or bots, raises the question: How do we ensure that these bots act appropriately? Within a decade, AI will be ubiquitous, with billions of active bots influencing nearly every industry and daily activity. Given the extensiveness of AI activity, it will be nearly impossible to explicitly program bots with detailed instructions on permitted and prohibited actions, particularly as they face unpredictable, novel situations. Rather, if risks to humans are to be mitigated, bots must have some overriding moral or legal compass--a set of "AI Laws"--to allow them to adapt to whatever scenarios …


A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk Jan 2018

A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk

Vanderbilt Journal of Entertainment & Technology Law

Historically, researchers obtained data from independent studies and government data. However, as public outcry for privacy regarding the government's maintenance of data has increased, the discretionary release of government data has decreased or become so anonymized that its relevance is limited. Research necessarily requires access to complete and accurate data. As such, researchers are turning to data brokers for the same, and often more, data than they can obtain from the government. Data brokers base their products and services on data gathered from a variety of free public sources and via the government-created Internet. Data brokers then recategorize the existing …


Linking The Public Benefit To The Corporation: Blockchain As A Solution For Certification In An Age Of "Do-Good" Business, Margaret D. Fowler Jan 2018

Linking The Public Benefit To The Corporation: Blockchain As A Solution For Certification In An Age Of "Do-Good" Business, Margaret D. Fowler

Vanderbilt Journal of Entertainment & Technology Law

As part of its now-infamous emissions scandal, Volkswagen spent tens of millions of dollars on advertising geared toward environmentally conscious consumers. The scandal is an example of "greenwashing," which, along with the corresponding term "fairwashing," represents the information asymmetry present in product markets that involve claims of social and environmental responsibility in companies' production practices. As consumers and investors demand responsible production practices from both traditional corporations and entities organized under the newer corporate form known as public benefit corporations (PBCs), it becomes even more important to verify that those entities' supply chains are, in fact, meeting standards for the …


The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse Jan 2017

The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse

Vanderbilt Journal of Transnational Law

The proceeds of cybercrime are typically laundered by money mules--people used by criminal organizations to interrupt the financial paper trail by transferring money for the criminals. This Article analyzes the discursive construction of the money mule in documents of national and international anti-money laundering authorities such as Financial Intelligence Units (FIUs), Europol, and the Financial Action Task Force (FATF). It shows how case study narratives, visualizations, and metaphors contribute to an understanding of the money mule as an innocent victim of organized crime networks from West Africa and Eastern Europe, supported by money remittance companies like Western Union. These constructions …


Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan Jan 2017

Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan

Vanderbilt Journal of Transnational Law

This Note examines the applicability of the law of armed conflict, and particularly the concept of proportionality, to cyber attacks. After exploring deviations in terminology that may lead to confusion in the field, it considers the difficulties associated with applying an area of law first implemented in the post-World War II era to technologies that have only become vitally important in recent years. Delving into some of the facets of cyber technology that make it unique as a potential battleground, this Note examines why those qualities make the law of proportionality particularly difficult to apply. Acknowledging that the law of …