Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 47

Full-Text Articles in Law

Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske Nov 2023

Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske

Vanderbilt Journal of Entertainment & Technology Law

This Article responds to the call in technology law literature for high-level frameworks to guide regulation of the development and use of Artificial Intelligence (AI) technologies. Accordingly, it adapts a generalized form of the fintech Innovation Trilemma framework to argue that a regulatory scheme can prioritize only two of three aims when considering AI oversight: (1) promoting innovation, (2) mitigating systemic risk, and (3) providing clear regulatory requirements. Specifically, this Article expressly connects legal scholarship to research in other fields focusing on foundation model AI systems and explores this kind of system’s implications for regulation priorities from the geopolitical and …


A Compulsory Solution To The Machine Problem: Recognizing Artificial Intelligence As Inventors In Patent Law, Cole G. Merritt Mar 2023

A Compulsory Solution To The Machine Problem: Recognizing Artificial Intelligence As Inventors In Patent Law, Cole G. Merritt

Vanderbilt Journal of Entertainment & Technology Law

Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.

To embrace the development and power of AI, Congress …


The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby Feb 2023

The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby

Vanderbilt Journal of Entertainment & Technology Law

A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …


The Death Of The Legal Subject, Katrina Geddes Feb 2023

The Death Of The Legal Subject, Katrina Geddes

Vanderbilt Journal of Entertainment & Technology Law

The law is often engaged in prediction. In the calculation of tort damages, for example, a judge will consider what the tort victim’s likely future earnings would have been, but for their particular injury. Similarly, when considering injunctive relief, a judge will assess whether the plaintiff is likely to suffer irreparable harm if a preliminary injunction is not granted. And for the purposes of a child custody evaluation, a judge will consider which parent will provide an environment that is in the best interests of the child.

Relative to other areas of law, criminal law is oversaturated with prediction. Almost …


The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


The Law And Politics Of Ransomware, Asaf Lubin Nov 2022

The Law And Politics Of Ransomware, Asaf Lubin

Vanderbilt Journal of Transnational Law

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …


Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee May 2022

Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee

Vanderbilt Journal of Transnational Law

This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. The two laws both converge and diverge. Their convergences include the stringent regulation of banned acts, network operators, critical infrastructure, data localization, and personal data. These are all shaped by the immediate diffusion of China's Cybersecurity Law in Vietnam and broader structural factors: namely, the common features of the socialist state, socialist legality, and the statist approach to human rights. The foundational divergence is between the Chinese notion of cybersecurity sovereignty and the Vietnamese notion of national cyberspace, which is …


“Computer Says No!”: The Impact Of Automation On The Discretionary Power Of Public Officers, Doa A. Elyounes Jan 2021

“Computer Says No!”: The Impact Of Automation On The Discretionary Power Of Public Officers, Doa A. Elyounes

Vanderbilt Journal of Entertainment & Technology Law

The goal of this Article is to unpack the “human in the loop” requirement in the process of automation. It will analyze the impact of automation on street-level bureaucrats and lay out the steps policy makers need to take into account to ensure that meaningful human discretion is maintained. This issue is examined by comparing two algorithms related to the use of automation to detect and investigate fraud in welfare benefits. The first algorithm is used by Michigan’s Unemployment Insurance Agency for detecting and investigating unemployment fraud. This is a draconian algorithm with the ability to automatically decide to cut …


Algorithmic Opacity, Private Accountability, And Corporate Social Disclosure In The Age Of Artificial Intelligence, Sylvia Lu Dec 2020

Algorithmic Opacity, Private Accountability, And Corporate Social Disclosure In The Age Of Artificial Intelligence, Sylvia Lu

Vanderbilt Journal of Entertainment & Technology Law

Today, firms develop machine-learning algorithms to control human decisions in nearly every industry, creating a structural tension between commercial opacity and democratic transparency. In many of their commercial applications, advanced algorithms are technically complicated and privately owned, which allows them to hide from legal regimes and prevents public scrutiny. However, they may demonstrate their negative effects—erosion of democratic norms, damages to financial gains, and extending harms to stakeholders—without warning. Nevertheless, because the inner workings and applications of algorithms are generally incomprehensible and protected as trade secrets, they can be completely shielded from public surveillance. One of the solutions to this …


People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke Jan 2020

People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke

Vanderbilt Journal of Entertainment & Technology Law

Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act') imposes conspicuous disclosure requirements …


The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz Jan 2020

The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz

Vanderbilt Journal of Entertainment & Technology Law

A new form of blockchain governance involving the use of formal games that incentivize participants to identify focal resolutions to normative questions is emerging. This symposium contribution provides a brief survey of the literature proposing and critiquing the use of such mechanisms of decentralized decision-making, and it evaluates early laboratory and real-world experiments with this approach.


Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer Mar 2019

Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer

Vanderbilt Journal of Entertainment & Technology Law

The digital era provides many opportunities, yet it also presents several unique challenges with regard to cybersecurity and the protection of digital assets. Cybercrime has changed the international legal landscape as nations, businesses, and legislators grapple with how to deal with this rapidly evolving, multifaceted problem. As there is no international mechanism for protection of foreign investors in this regard, some scholars are advocating for the use of Bilateral Investment Treaties (BITs) as part of a 'olycentric" approach to cyber peace. With an uptick in digital development and more development on the horizon, it will be important to establish what …


Neuroscience, Artificial Intelligence, And The Case Against Solitary Confinement, Francis X. Shen Jan 2019

Neuroscience, Artificial Intelligence, And The Case Against Solitary Confinement, Francis X. Shen

Vanderbilt Journal of Entertainment & Technology Law

Prolonged solitary confinement remains in widespread use in the United States despite many legal challenges. A difficulty when making the legal case against solitary confinement is proffering sufficiently systematic and precise evidence of the detrimental effects of the practice on inmates' mental health. Given this need for further evidence, this Article explores how neuroscience and artificial intelligence (AI) might provide new evidence of the effects of solitary confinement on the human brain.

This Article argues that both neuroscience and AI are promising in their potential ability to present courts with new types of evidence on the effects of solitary confinement …


Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Vanderbilt Law Review

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan Jan 2018

Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan

Vanderbilt Journal of Entertainment & Technology Law

Differential privacy is a formal mathematical framework for quantifying and managing privacy risks. It provides provable privacy protection against a wide range of potential attacks, including those currently unforeseen. Differential privacy is primarily studied in the context of the collection, analysis, and release of aggregate statistics. These range from simple statistical estimations, such as averages, to machine learning. Tools for differentially private analysis are now in early stages of implementation and use across a variety of academic,industry, and government settings. Interest in the concept is growing among potential users of the tools, as well as within legal and policy communities, …


Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla Jan 2018

Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla

Vanderbilt Journal of Entertainment & Technology Law

Cyberattacks are occurring at an accelerating pace. Foreign nations are increasingly utilizing hacking as a tool for economic gain, acts of aggression, or international political expression. At risk are US consumers'personal data, private firms' bottom line, and the economies'integrity. In response, federal and state lawmakers have issued a series of disparate, uncoordinated policies seeking to strengthen cybersecurity practices. However, recent events indicate that these policies are less than ideal. This Note suggests that a unified response to cybersecurity is required and calls for the establishment of a single, central federal agency with authority over all cybersecurity regulations. Such an agency …


Virtual Reality Exceptionalism, Gilad Yadin Jan 2018

Virtual Reality Exceptionalism, Gilad Yadin

Vanderbilt Journal of Entertainment & Technology Law

Virtual reality is here. In just a few years, the technology moved from science fiction to the Internet, from specialized research facilities to living rooms. These new virtual reality environments are connected, collaborative, and social-built to deliver a subjective psychological effect that believably simulates spatial physical reality. Cognitive research shows that this effect is powerful enough that virtual reality users act and interact in ways that mirror real-world social and moral norms and behavior.

Contemporary cyberlaw theory is largely based on the notion that cyberspace is exceptional enough to warrant its own specific rules. This premise, a descendant of early …


The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian Jan 2018

The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian

Vanderbilt Journal of Entertainment & Technology Law

The advent of sophisticated artificial intelligence (AI) agents, or bots, raises the question: How do we ensure that these bots act appropriately? Within a decade, AI will be ubiquitous, with billions of active bots influencing nearly every industry and daily activity. Given the extensiveness of AI activity, it will be nearly impossible to explicitly program bots with detailed instructions on permitted and prohibited actions, particularly as they face unpredictable, novel situations. Rather, if risks to humans are to be mitigated, bots must have some overriding moral or legal compass--a set of "AI Laws"--to allow them to adapt to whatever scenarios …


A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk Jan 2018

A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk

Vanderbilt Journal of Entertainment & Technology Law

Historically, researchers obtained data from independent studies and government data. However, as public outcry for privacy regarding the government's maintenance of data has increased, the discretionary release of government data has decreased or become so anonymized that its relevance is limited. Research necessarily requires access to complete and accurate data. As such, researchers are turning to data brokers for the same, and often more, data than they can obtain from the government. Data brokers base their products and services on data gathered from a variety of free public sources and via the government-created Internet. Data brokers then recategorize the existing …


Linking The Public Benefit To The Corporation: Blockchain As A Solution For Certification In An Age Of "Do-Good" Business, Margaret D. Fowler Jan 2018

Linking The Public Benefit To The Corporation: Blockchain As A Solution For Certification In An Age Of "Do-Good" Business, Margaret D. Fowler

Vanderbilt Journal of Entertainment & Technology Law

As part of its now-infamous emissions scandal, Volkswagen spent tens of millions of dollars on advertising geared toward environmentally conscious consumers. The scandal is an example of "greenwashing," which, along with the corresponding term "fairwashing," represents the information asymmetry present in product markets that involve claims of social and environmental responsibility in companies' production practices. As consumers and investors demand responsible production practices from both traditional corporations and entities organized under the newer corporate form known as public benefit corporations (PBCs), it becomes even more important to verify that those entities' supply chains are, in fact, meeting standards for the …


The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse Jan 2017

The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse

Vanderbilt Journal of Transnational Law

The proceeds of cybercrime are typically laundered by money mules--people used by criminal organizations to interrupt the financial paper trail by transferring money for the criminals. This Article analyzes the discursive construction of the money mule in documents of national and international anti-money laundering authorities such as Financial Intelligence Units (FIUs), Europol, and the Financial Action Task Force (FATF). It shows how case study narratives, visualizations, and metaphors contribute to an understanding of the money mule as an innocent victim of organized crime networks from West Africa and Eastern Europe, supported by money remittance companies like Western Union. These constructions …


Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan Jan 2017

Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan

Vanderbilt Journal of Transnational Law

This Note examines the applicability of the law of armed conflict, and particularly the concept of proportionality, to cyber attacks. After exploring deviations in terminology that may lead to confusion in the field, it considers the difficulties associated with applying an area of law first implemented in the post-World War II era to technologies that have only become vitally important in recent years. Delving into some of the facets of cyber technology that make it unique as a potential battleground, this Note examines why those qualities make the law of proportionality particularly difficult to apply. Acknowledging that the law of …


Augmenting Property Law: Applying The Right To Exclude In The Augmented Reality Universe, Samuel Mallick Jan 2017

Augmenting Property Law: Applying The Right To Exclude In The Augmented Reality Universe, Samuel Mallick

Vanderbilt Journal of Entertainment & Technology Law

This Note considers whether and to what extent the property right to exclude applies to virtual space in the augmented reality (AR) universe. It provides an overview of AR's development and uses, as well as a review of property law concerning the right to exclude. By considering the consequences of previously proposed regulatory schemes in light of four hypothetical AR applications, this Note demonstrates that these solutions do not adequately balance the societal benefit achievable through free development of AR applications with landowners' absolute rights to exclude others from their property. This Note proposes adoption of an adjusted "open-range" common …


Hidden By Sovereign Shadows: Improving The Domestic Framework For Deterring State-Sponsored Cybercrime, Eric Blinderman, Myra Din Jan 2017

Hidden By Sovereign Shadows: Improving The Domestic Framework For Deterring State-Sponsored Cybercrime, Eric Blinderman, Myra Din

Vanderbilt Journal of Transnational Law

This Article analyzes the domestic legal framework applicable to state-sponsored cybercrime. The Article describes several instances where state sovereigns perpetrated cybercrimes in the United States. It then outlines the legal framework that the US government utilizes to hold accountable those who perpetrate such crimes. This Article argues that the current legal framework does not have a deterrence effect on sovereign states engaged in such activity and that prosecutors who seek to apply the current framework against state sovereigns or who misattribute the source of such attacks could negatively impact US foreign policy. To remedy these defects, this Article asserts that …


Keeping Ai Legal, Amitai Etzioni, Oren Etzioni Jan 2016

Keeping Ai Legal, Amitai Etzioni, Oren Etzioni

Vanderbilt Journal of Entertainment & Technology Law

AI programs make numerous decisions on their own, lack transparency, and may change frequently. Hence, unassisted human agents, such as auditors, accountants, inspectors, and police, cannot ensure that AI-guided instruments will abide by the law. This Article suggests that human agents need the assistance of AI oversight programs that analyze and oversee operational AI programs. This Article asks whether operational AI programs should be programmed to enable human users to override them; without that, such a move would undermine the legal order. This Article also points out that AI operational programs provide high surveillance capacities and, therefore, are essential for …


Just What The Doctor Ordered: Protecting Privacy Without Impeding Development Of Digital Pills, Amelia R. Montgomery Jan 2016

Just What The Doctor Ordered: Protecting Privacy Without Impeding Development Of Digital Pills, Amelia R. Montgomery

Vanderbilt Journal of Entertainment & Technology Law

Using technology, humans are receiving more and more information about the world around them via the Internet of Things, and the next area of connection will be the inside of the human body. Several forms of "digital pills" that send information from places like the human digestive tract or bloodstream are being developed, with a few already in use. These pills could stand to provide information that could drastically improve the lives of many people, but they also have privacy and data security implications that could put consumers at great risk. This Note analyzes these risks and suggests that short-term …


On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford Jan 2016

On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford

Vanderbilt Journal of Entertainment & Technology Law

Although cyberspace and the atmosphere are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and challenges of collective inaction and free riders. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem that affects the entire world. Yet its benefits are dispersed, and its harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a few nations even as others are becoming havens for cybercriminals. Yet it is also true that actions taken by a multiplicity of actors on …


Up In The Cloud: Finding Common Ground In Providing For Law Enforcement Access To Data Held By Cloud Computing Service Providers, Matthew Mckenna Jan 2016

Up In The Cloud: Finding Common Ground In Providing For Law Enforcement Access To Data Held By Cloud Computing Service Providers, Matthew Mckenna

Vanderbilt Journal of Transnational Law

Cloud computing is an everyday part of the modern world; a technology that is increasingly transcending international borders. Disregarding international borders allows cloud computing to operate more efficiently and thus provides better service to users. Yet, the global nature of cloud computing raises a question--what happens if multiple countries apply facially similar laws to cloud computing providers differently? This scenario is common, especially in the context of law enforcement seeking access to cloud computing data. The United States and the United Kingdom have similar laws regarding the government's ability to acquire users' data. Importantly, neither law explicitly addresses the question …


Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard Jan 2014

Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard

Vanderbilt Journal of Transnational Law

Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences of such intrusions are sufficiently damaging, international humanitarian law (IHL) should generally govern them--and recourse to armed force may also be justified against states responsible for these actions under the jus ad bellum. This Article argues, however, that there are serious problems and perils in relying on analogies with physical armed force to extend these legal regimes to most events in cyberspace. Armed conflict models applied to the use of information as a weapon and a target are instead likely to …


From State Street Bank To Cls Bank And Back: Reforming Software Patents To Promote Innovation, Parker Hancock Jan 2014

From State Street Bank To Cls Bank And Back: Reforming Software Patents To Promote Innovation, Parker Hancock

Vanderbilt Journal of Entertainment & Technology Law

For the past several decades, the Supreme Court and Federal Circuit have struggled to determine if, and under what circumstances, software is patentable. Once again, the Federal Circuit had an opportunity to provide clarity when it granted en banc review in CLS Bank. The resulting opinion contained a cursory per curiam decision and numerous concurrences and dissents, showing that the question is far from answered. Ultimately, the struggle over software patentability is not itself the problem, but a symptom of other problems in the patent system. Specifically, other substantive requirements of patentability are not weeding out overly broad patents because …