Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Uncertain Terms, Leah R. Fowler, Jim Hawkins, Jessica L. Roberts Dec 2021

Uncertain Terms, Leah R. Fowler, Jim Hawkins, Jessica L. Roberts

Notre Dame Law Review

Health apps collect massive amounts of sensitive consumer data, including information about users’ reproductive lives, mental health, and genetics. As a result, consumers in this industry may shop for privacy terms when they select a product. Yet our research reveals that many digital health tech companies reserve the right to unilaterally amend their terms of service and their privacy policies. This ability to make one-sided changes undermines the market for privacy, leaving users vulnerable. Unfortunately, the current law generally tolerates unilateral amendments, despite fairness and efficiency concerns. We therefore propose legislative, regulatory, and judicial solutions to better protect consumers of …


Introduction, Mark P. Mckenna May 2021

Introduction, Mark P. Mckenna

Notre Dame Law Review Reflection

Julie Cohen’s Between Truth and Power is, as Orly Lobel writes, a “dazzling tour de force” that “asks us to consider the new ways powerful actors extract valuable resources for gain and dominance.” As she has done so frequently, Cohen takes an incredibly complex story and weaves together a comprehensive narrative that changes the entire framing of legal questions. Agree or disagree with her diagnoses, no one who seriously engages this book will ever think about regulation in the information economy the same way.

In January 2020 (seemingly a lifetime ago, given what 2020 would bring), we gathered leading thinkers …


Biopolitical Opportunities: Between Datafication And Governance, Orly Lobel May 2021

Biopolitical Opportunities: Between Datafication And Governance, Orly Lobel

Notre Dame Law Review Reflection

Julie Cohen’s dazzling tour de force Between Truth and Power asks us to consider the new ways powerful actors extract valuable resources for gain and dominance. Cohen in particular warns that “the universe of personal data as a commons [is] ripe for exploitation.” Cohen writes that “if protections against discrimination, fraud, manipulation, and election interference are to be preserved in the era of infoglut, regulators will need to engage more directly with practices of data-driven, algorithmic intermediation and their uses and abuses.” I read Between Truth and Power as not only a compelling account of the contemporary transformations of law …


Outsourcing Privacy, Ari Ezra Waldman May 2021

Outsourcing Privacy, Ari Ezra Waldman

Notre Dame Law Review Reflection

An underappreciated part of the narrative of privacy managerialism—and the focus of this Essay—is the information industry’s increasing tendency to outsource privacy compliance responsibilities to technology vendors. In the last three years alone, the International Association of Privacy Professionals (IAPP) has identified more than 250 companies in the privacy technology vendor market. These companies market their products as tools to help companies comply with new privacy laws like the General Data Protection Regulation (GDPR), with consent orders from the Federal Trade Commission (FTC), and with other privacy rules from around the world. They do so by building compliance templates, pre-completed …


The Impact Of Schrems Ii: Next Steps For U.S. Data Privacy Law, Andraya Flor May 2021

The Impact Of Schrems Ii: Next Steps For U.S. Data Privacy Law, Andraya Flor

Notre Dame Law Review

Schrems II invalidated Privacy Shield because the court found that it did not provide an “essentially equivalent” level of protection compared to the guarantees of the GDPR. The National Security Agency (NSA) operated surveillance programs that had the potential to infringe on the rights of EU subjects, and there was a lack of oversight and effective judicial remedies to protect rights of EU data subjects, which undermined Privacy Shield as a mechanism for data transfers. This Note sets aside the surveillance and national security issue, which would require resolution through a shift in overall U.S. national security law, and instead …


The Pragmatic Disappointment Of State Preemption: The 2016 Defend Trade Secrets Act And Its Failure To Protect Employee Whistleblowers From Federal Computer Crime Law, Kristine Craig Apr 2018

The Pragmatic Disappointment Of State Preemption: The 2016 Defend Trade Secrets Act And Its Failure To Protect Employee Whistleblowers From Federal Computer Crime Law, Kristine Craig

Journal of Legislation

No abstract provided.


Prolegomenon On Pornography, Gerard V. Bradley Jan 2018

Prolegomenon On Pornography, Gerard V. Bradley

Journal Articles

Debates about pornography have always included arguments about its “effects.” Now we can gauge the effects of specifically computerized pornography. These novel effects include scientific research showing that digitalized pornography affects the brain and nervous system in harmful ways that no centerfold ever could. Accessing pornography online makes interactive and directive engagement with it possible, so that the consumer is no longer limited to staring at a two-dimensional representation of a stranger in the nude. The action now is more adventurous. The consumer’s involvement is more intimate and directive. What he does lies somewhere between looking at a centerfold and …


A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia Jan 2016

A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia

Journal Articles

Thirty years ago, Congress passed the Computer Fraud and Abuse Act (CFAA) to combat the emerging problem of computer crime. The statute’s core prohibitions targeted one who “accesses” a computer “without authorization” or who “exceeds authorized access.” Over time, incremental statutory changes and large-scale technical changes have dramatically expanded the potential scope of the CFAA. The question of what constitutes unauthorized access has taken on far greater significance than it had thirty years ago, and courts remain deeply divided on this question. This Article explores the text, purpose, and history of the CFAA, as well as a range of normative …


Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette Feb 2014

Online Terms Of Service: A Shield For First Amendment Scrutiny Of Government Action, Jacquelyn E. Fradette

Notre Dame Law Review

Part I of this Note will canvas popular opinions and perceptions about First Amendment rights on the Internet using examples of public outcry over recent instances of speech limitation. It will also discuss the state action doctrine generally and how the presence of this doctrine most likely renders certain popular public constitutional intuitions about the First Amendment erroneous.

Part II will provide an overview of how courts have taken an expansive and protective view of private ordering between online parties. It will discuss how courts have developed a robust freedom to contract jurisprudence in the Internet context. Because courts essentially …


The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco Jan 1994

The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco

Journal Articles

The goal of copyright law is "[t]o promote the Progress of Science and Useful Arts." It is premised on the assumption that "encourag[ing] . . . individual effort by personal gain is the best way to advance public welfare through the talents of authors . . ." In order to "promote progress," however, copyright law must respond to changes in technology.

One issue that has been problematic for the courts is whether and to what extent the nonliteral elements of computer programs are copyrightable. Nonliteral elements are aspects of the computer program other than the written code itself. Although it …