Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 87

Full-Text Articles in Law

Taxing & Zapping Marijuana: Blockchain Compliance In The Trump Administration Part 3, Richard Thompson Ainsworth, Brendan Magauran Aug 2018

Taxing & Zapping Marijuana: Blockchain Compliance In The Trump Administration Part 3, Richard Thompson Ainsworth, Brendan Magauran

Faculty Scholarship

This is the third of a five-part series dealing with the rescission by U.S. Attorney General Jeff Sessions of the Obama-era policy that discouraged federal prosecutors from bringing charges in all but the most serious marijuana cases.

This article focuses on cyber-attacks on the main commercial chain, and the use of a private blockchain using HyperLedger Fabric as a platform.

This fraud is a direct, criminal attack; an attack designed to destroy/corrupt records of marijuana inventory and plant tags throughout the supply chain. The attack allows legalized marijuana to escape the system and be sold on the black market. A …


Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine Mar 2018

Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine

Faculty Scholarship

Electronic sales suppression (ESS) is a fraud that has been a (prominent) feature of the North American retail business since at least 1996. The first EES case in the US dates from 1981. ESS is a global problem. Depending on the jurisdiction, and the research study consulted, ESS is estimated to be present in 34% (of Canadian), 50% (of German – two studies), and 70% (of Swedish and Slovenian) businesses. It may be the case today, that “you cannot leave home without” encountering (or participating in) ESS.

The most common types of sales suppression technology are Zappers and Phantomware programming. …


Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars Jan 2018

Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars

Faculty Scholarship

"Web scraping" is a ubiquitous technique for extracting data from the World Wide Web, done through a computer script that will send tailored queries to websites to retrieve specific pieces of content. The technique has proliferated under the ever-expanding shadow of the Computer Fraud and Abuse Act (CFAA), which, among other things, prohibits obtaining information from a computer by accessing the computer without authorization or exceeding one's authorized access.

Unsurprisingly, many litigants have now turned to the CFAA in attempt to police against unwanted web scraping. Yet despite the rise in both web scraping and lawsuits about web scraping, practical …


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Interpretation Catalysts In Cyberspace, Rebecca Ingber Jun 2017

Interpretation Catalysts In Cyberspace, Rebecca Ingber

Faculty Scholarship

The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …


Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi Feb 2017

Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi

Faculty Scholarship

Blockchain is coming to tax administration and will cause fundamental change. This article considers the potential for blockchain technology as it applies to the introduction of a value added tax in the Gulf Cooperation Council.

Blockchain technology disrupts centralized ledgers. Blockchain improves efficiency, security and transparency. Perhaps no centralized ledger system presents more challenges than that of the modern tax administration. The central data storage system of a modern tax authority contains all return, payment, and audit activity for all taxpayers arranged tax-by-tax for three years or longer periods of time.

It is likely that blockchain will come first to …


Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale Jan 2017

Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog Jan 2017

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog

Faculty Scholarship

For the past thirty years, the general advice for those seeking to collect, use, and share people’s personal data in a responsible way was relatively straightforward: follow the fair information practices, often called the “FIPs.” These general guidelines were designed to ensure that data processors are accountable for their actions and that data subjects are safe, secure, and endowed with control over their personal information. The FIPs have proven remarkably sturdy against the backdrop of near-constant technological change. Yet in the age of social media, big data, and artificial intelligence, the FIPs have been pushed to their breaking point. We …


Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton Jan 2017

Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton

Faculty Scholarship

This paper takes a normative approach to patent infringement damages. Its underlying premise is that the goal of a damages regime should be to maximize society's welfare. Patent damages should therefore balance society's interest in encouraging innovation against the need to regulate infringement incentives. This balancing approach generates an optimal standard for awarding enhanced damages and guidelines for determining the size of the damages multiplier. On the legal standard, the approach developed here illuminates the factors that should be taken into consideration in the enhancement analysis, and, more importantly, the reasons those factors should be considered. On the precise size …


Whither (Not Wither) Copyleft, Eben Moglen Jan 2017

Whither (Not Wither) Copyleft, Eben Moglen

Faculty Scholarship

This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.


Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham Aug 2016

Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham

Faculty Scholarship

Bitcoin is the world’s first peer-to-peer cryptocurrency. VATCoin is similar, but it is used in tax compliance. Both Bitcoin and VATCoin are distributive ledger applications built upon blockchain technology. Bitcoin’s ledger is public; VATCoin’s is private. If adopted, VATCoin could well become the world’s first government-mandated cryptotaxcurrency. Unlike Bitcoin, VATCoin will not be a speculative currency. It is always fixed to the home currency.

This paper proposes that the Gulf Cooperation Council (GCC) adopt VATCoin in its VAT Framework. The GCC is expected to have multiple 5% VATs in place by January 1, 2018. There is an ample amount of …


How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon Apr 2016

How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon

Faculty Scholarship

In Oracle v. Google (2015), the Federal Circuit addressed whether the " method header " components of a dominant computer program were uncopyrightable as " merging " with the headers' ideas or function. Google had copied the headers to ease the ability of third-party programmers to interact with Google's Android platform. The court rebuffed the copyrightability challenge; it reasoned that because the plaintiff's expression might have been written in alternative forms, there was no " merger " of idea and expression. But the Oracle court may have been asking the wrong question. In Lotus v. Borland (1995), the owner of …


The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell Jan 2016

The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell

Faculty Scholarship

No abstract provided.


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron Jan 2016

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley Jan 2016

A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley

Faculty Scholarship

Rauterberg & Talley (2017) develop a data set of “corporate opportunity waivers” (COWs) – significant contractual modifications of fiduciary duties – sampled from SEC filings. Part of their analysis utilizes a machine learning (ML) classifier to extend their data set beyond the hand-coded sample. Because the ML approach is likely unfamiliar to some readers, and in the light of its great potential across other areas of law and finance research, this note explains the basic components using a simple example, and it demonstrates strategies for calibrating and evaluating the classifier.


Spying Inc., Danielle Keats Citron Jan 2015

Spying Inc., Danielle Keats Citron

Faculty Scholarship

The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.

Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, …


Disruption And Deference, Olivier Sylvain Jan 2015

Disruption And Deference, Olivier Sylvain

Faculty Scholarship

Online video streaming applications enable users to watch over the-air broadcast programs at any time and almost on any device. As such, they challenge the pertinence of traditional video distribution law and the broadcast network system on which it is based. Congress enacted the Transmit Clause of the 1976 Copyright Act to resolve the high-stakes tussle between broadcasters and cable providers. But, today, that provision is ill-suited to resolving whether unauthorized streaming infringes on broadcasters’ copyright to perform works publicly. Its scope is ambiguous enough that judges across the country were notably divided on whether it reaches online video distribution—that …


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale

Faculty Scholarship

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer Feb 2014

Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer

Faculty Scholarship

The Federal Circuit’s expansion of patentable subject matter in the 1990s led to a threefold increase in software patents, many of which contain abstract ideas merely tethered to a general-purpose computer. There is little evidence, however, to suggest this expansion has produced an increase in software innovation. The software industry was highly innovative in the decade immediately prior to this expansion, when the viability of software patentability was unclear and software patents were few. When surveyed, most software developers oppose software patenting, and, in practice, software innovators tend to rely on other tools to capture market share such as first-mover …


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen Jan 2014

Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen

Faculty Scholarship

This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Google And Search-Engine Market Power, Mark R. Patterson Jan 2013

Google And Search-Engine Market Power, Mark R. Patterson

Faculty Scholarship

A significant and growing body of commentary considers whether possible manipulation of search results by Google could give rise to antitrust liability. Surprisingly, though, little serious attention has been paid to whether Google has market power. Those who favor antitrust scrutiny of Google generally cite its large market share, from which they infer or assume its dominance. Those who are skeptical of competition law’s role in regulating search, on the other hand, usually cite Google’s 'competition is only a click away' mantra to suggest that Google’s market position is precarious. In fact, the issue of Google’s power is more complicated …


Machine Speech, Tim Wu Jan 2013

Machine Speech, Tim Wu

Faculty Scholarship

Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here “algorithmic outputs,” claim First Amendment protection?


Sealand, Havenco, And The Rule Of Law, James Grimmelmann Jan 2012

Sealand, Havenco, And The Rule Of Law, James Grimmelmann

Faculty Scholarship

In 2000, a group of American entrepreneurs moved to a former World War II anti-aircraft platform in the North Sea, seven miles off the British coast, and launched HavenCo, one of the strangest start-ups in Internet history. A former pirate radio broadcaster, Roy Bates, had occupied the platform in the 1960s, moved his family aboard, and declared it to be the sovereign Principality of Sealand. HavenCo's founders were opposed to governmental censorship and control of the Internet; by putting computer servers on Sealand, they planned to create a "data haven" for unpopular speech, safely beyond the reach of any other …


Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh Jan 2012

Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh

Faculty Scholarship

Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth Mar 2010

Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth

Faculty Scholarship

Marketplace technology is (inadvertently) chipping away at the effectiveness of consumption taxes – the Japanese Consumption Tax (CT), the European value added tax (VAT), and the American sales tax (ST) are all affected. Frequently a technology-patch or a law change can repair the tax-damage, but sometimes even though a patch or a change is known the design of the levy (or the politics behind the design) impedes application. This paper assesses these consumption taxes by considering the impact that virtual travel agents have had on revenue yields. The paper draws specific conclusions for the Japanese CT, because this consumption tax …


Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio Jan 2010

Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio

Faculty Scholarship

No abstract provided.


Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale Jan 2010

Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale

Faculty Scholarship

Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests.

Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …