Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Algorithm (2)
- Blockchain (2)
- Federal law (2)
- Hack (2)
- Identity theft (2)
-
- Personal data (2)
- Quantum computing (2)
- China (1)
- Code (1)
- Coding (1)
- Communism (1)
- Communist party (1)
- Copyright (1)
- Cyber security (1)
- DLT (1)
- Data security (1)
- Digital (1)
- Distributed ledger technology (1)
- Electronic Communications Privacy Act (1)
- Fair use (1)
- Fourth Amendment (1)
- Language (1)
- Ledger (1)
- NFT (1)
- Personal information (1)
- Regulation (1)
- Trade dress (1)
- Trademark (1)
- Video games (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
Creativity Without Ip? Vindication And Challenges In The Video Game Industry, Bj Ard
Creativity Without Ip? Vindication And Challenges In The Video Game Industry, Bj Ard
Washington and Lee Law Review
This Article intervenes in the longstanding debate over whether creative production is possible without exhaustive copyright protection. Intellectual property (IP) scholars have identified “negative spaces” like comedy and tattoo art where creativity thrives without IP, but critics dismiss these examples as niche. The video game industry allows for fresh headway. It is now the largest sector in entertainment—with revenues greater than Hollywood, streaming, and music combined—yet IP does not protect key game elements from duplication. Participants navigate this absence using non-IP strategies like those identified in negative-space industries: AAA developers invest in copy-resistant features while indie game developers rely on …
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes
The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes
Washington and Lee Law Review
Criticism of the Chinese Communist Party (CCP) runs a wide gamut. Accusations of human rights abuses, intellectual property theft, authoritarian domestic policies, disrespecting sovereign borders, and propaganda campaigns all have one common factor: the CCP’s desire to control information. Controlling information means controlling data. Lurking beneath the People’s Republic of China’s (PRC) tumultuous relationship with the rest of the world is the fight between nations to control their citizens’ data while also keeping it out of the hands of adversaries. The CCP’s Three Laws are its newest weapon in this data war.
One byproduct of the CCP’s emphasis on controlling …
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Scholarly Articles
Much of the confusion about the proper regulation of smart contracts stems from the fact that both code and law are expressed in language. Natural (human) and formal (computer) languages are profoundly different, however. Natural language in the form of a true legal contract expresses human meaning and expectation. Code simply acts, and when code acts contrary to the understanding of the parties to a contract, courts must have a theoretical and legal basis in order to intervene--which this Article provides.
Present scholarship on the governance of smart contracts centers on logistical problems relating to the effects of automation on …
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Scholarly Articles
Markets for unique digital property--digital equivalents of rare artworks, collectible trading cards, and other assets that gain value from scarcity--have exploded in the past few years. At root is the next iteration of blockchain technology, unique digital assets called non-fungible tokens. Unlike bitcoin, where one coin is the same as another, NFTs are unique, each with different attributes. An NFT that represented ownership of Boardwalk would be quite different from one that represented Baltic Avenue.
NFTs have grown from a few early breakout successes to a rapidly developing market for unique digital treasures. The attraction to buyers is that, unlike …
Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon
Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon
Washington and Lee Law Review
In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.
This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …
Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty
Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty
Washington and Lee Law Review
The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …