Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 148

Full-Text Articles in Law

Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson Jan 2021

Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson

Catholic University Journal of Law and Technology

The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.


No Ifs, Ands, Or Juuls About It: Why Influencers Must Be Held Accountable, Krystina Dorta Jan 2021

No Ifs, Ands, Or Juuls About It: Why Influencers Must Be Held Accountable, Krystina Dorta

Catholic University Journal of Law and Technology

This article analyzes how the FTC’s Endorsement Guide regulating the advertising of e-cigarette products should be applied to social media influencers. The struggle to regulate e-cigarettes by the FDA and the FTC has led to different advertising methods, which either comply with or neglect the FTC’s Endorsement Guide. This article evaluates the federal government’s reaction to the e-cigarette health crisis, followed by a review of the FTC’s previous actions addressing Endorsement Guide violations, along with the consequences on other companies’ marketing strategies. Finally, this article reviews influencer liability standards for Endorsement Guide violations and develops recommendations to improve those standards.


Sounds Of Science: Copyright Infringement In Ai Music Generator Outputs, Eric Sunray Jan 2021

Sounds Of Science: Copyright Infringement In Ai Music Generator Outputs, Eric Sunray

Catholic University Journal of Law and Technology

The music business is no stranger to disruptive technology. The industry’s apparent comeback from the devastating downturn caused by illegal file sharing seems to have arrived just in time for what may be an even more disruptive technological phenomenon: artificial intelligence (“AI”). Much has been said about the implications of AI-generated music, ranging from issues of ownership, to rights of publicity. However, there has been surprisingly little discussion of infringement in the AI systems’ outputs. By examining the functionality of AI music generators through the lens of de minimis use case law, this paper will explain how the outputs of …


Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist Jan 2021

Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist

Catholic University Journal of Law and Technology

The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …


Masthead, Editor-In- Chief Jan 2021

Masthead, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Editor-In- Chief Jan 2021

Table Of Contents, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


The End Of The Affair, Marc O. Degirolami Jan 2021

The End Of The Affair, Marc O. Degirolami

Scholarly Articles

Religion and liberalism have reached a complicated entente in the law of American and European democracies. At times the relationship has been diffi- dently cordial; at others something that appeared warmer. This period marked a change from previous eras of far more open mutual hostility. Liberalism and the traditional, historically rich and influential religions—particularly Christianity— never have been allies. To the contrary, liberalism was designed in part expressly to neuter the communal and political power of religion—again, especially Christianity—and to separate law from religion for the purpose of weakening the latter. The current rapprochement has endured for more than a …


How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr Jan 2020

How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr

Catholic University Journal of Law and Technology

In the Disney film Bambi, when the young rabbit Thumper says that Bambi “is kinda wobbly” and “doesn’t walk too good,” Thumper’s mother tells him “if you can’t say something nice, don’t say anything at all.” The Des Moines Register seems to have forgotten Thumper’s Rule when it uncovered Carson King’s teenage tweets and canceled the relationship he had built with Busch Light while raising $3 million for the Stead Family Children’s Hospital. #CancelCulture is a social media phenomenon, where some people use their voices to cancel the platform enjoyed by others. It is the 2019 equivalent of the …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Pre-Game Strategy For Long-Term Win: Using Trademark Registration And Right Of Publicity To Protect Esports Gamers, John Bat Jan 2020

Pre-Game Strategy For Long-Term Win: Using Trademark Registration And Right Of Publicity To Protect Esports Gamers, John Bat

Catholic University Journal of Law and Technology

The soaring popularity of esports across the globe has turned ultra-talented gamers into a blend of athlete and entertainer. The youthful esports ecosystem is exploding in growth, and the world is taking notice. But are the gamers who are eyeing professional play taking basic legal steps to develop and shield their brands, as well as bolster their collective negotiating leverage with teams, leagues, and miscellaneous entities? This note explores what features of an up-and-coming esports gamer might be worth protecting through a trademark and/or personality-rights schema, which in turn, could assist competitive gamers who are interested in developing their careers …


The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland Jan 2020

The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland

Catholic University Journal of Law and Technology

Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …


First Amendment Traditionalism, Marc O. Degirolami Jan 2020

First Amendment Traditionalism, Marc O. Degirolami

Scholarly Articles

Traditionalist constitutional interpretation takes political and cultural practices of long age and duration as constituting the presumptive meaning of the text. This Essay probes traditionalism's conceptual and normative foundations. It focuses on the Supreme Court's traditionalist interpretation of the First Amendment to understand the distinctive justifications for traditionalism and the relationship between traditionalism and originalism. The first part of the Essay identifies and describes traditionalism in some of the Court's Speech and Religion Clause jurisprudence, highlighting its salience in the Court's recent Establishment Clause doctrine.

Part II develops two justfications for traditionalism: "interpretive" and "democratic-populist." The interpretive justification is that …


Protecting Internet Freedom At The Expense Of Facilitating Online Child Sex Trafficking? An Explanation As To Why Cda's Section 230 Has No Place In A New Nafta, Elizabeth Carney May 2019

Protecting Internet Freedom At The Expense Of Facilitating Online Child Sex Trafficking? An Explanation As To Why Cda's Section 230 Has No Place In A New Nafta, Elizabeth Carney

Catholic University Law Review

Section 230 of the Communications Decency Act was passed in 1996 to promote and develop a nascent internet industry. The legislation affords protection from civil liability to internet providers that host content created by a third party. Section 230 protects internet companies that would otherwise be financially devastated by every defamation or libel lawsuit brought for each bad review or false statement posted. As the argument goes, all the familiar websites, such as Facebook, Yelp, and Twitter, would not have flourished without this vital legislation. Although Section 230 has played an important role in developing the internet today as we …


Copyright Policy As Catalyst And Barrier To Innovation And Free Expression, Amanda Reid Mar 2019

Copyright Policy As Catalyst And Barrier To Innovation And Free Expression, Amanda Reid

Catholic University Law Review

At its core, copyright is an innovation policy, a competition policy, and a free expression policy. Copyright seeks to balance incentivizing a public good with providing a private interest. Copyright’s purpose to catalyze creative expression and innovation is canonical; creativity and innovation are synergetic. Copyright is a means of promoting progress; copyright is not an end in itself. Much like freedom of expression and new innovations are not ends in themselves, copyright protection is not for its own sake. Freedom of expression is often heralded as a means of fostering democratic self-governance, truth, and happiness. Innovation is seen as a …


Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel Jan 2019

Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel

Catholic University Journal of Law and Technology

Deference doctrines should be understood in light of the Administrative Procedures Act’s distinction between legislative rules and interpretive rules and should be based on a solid theoretical foundation. Modern Auer deference calls for categorical deference for an agency’s regulatory interpretation of an ambiguous regulation. This is inconsistent with the APA’s characterization of the purpose of an interpretive rule. Properly construed, interpretive rules clarify the meaning of a legal text which should be justified by use of expository reasoning. These rules deserve a lesser form of deference (Skidmore deference), based on an agency’s unique understanding of its own regulations which …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara Jan 2019

The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara

Catholic University Journal of Law and Technology

As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.

Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


The Sickness Unto Death Of The First Amendment, Marc O. Degirolami Jan 2019

The Sickness Unto Death Of The First Amendment, Marc O. Degirolami

Scholarly Articles

Part I of this paper describes early American understandings of the purposes and limits of freedom of speech. During this period, the outer bounds of freedom of speech reflected similar limits on the right of religious freedom: both were conceived within an overarching framework of natural rights delimited by legislative judgments about the common political good. Though there is scholarly debate about how much the Fourteenth Amendment may have altered that approach in certain details, the basic legal framework remained intact in the nineteenth century.

Part II traces the replacement of that framework with a very different one in the …


Mastering Masterpiece, Kristen K. Waggoner Jan 2019

Mastering Masterpiece, Kristen K. Waggoner

Catholic University Law Review

Religious freedom ensures that every person has the right to explore life’s deepest questions and to live out their religious convictions in public life. Free speech similarly ensures that all have the liberty to express their views and pursue truth without fear of government punishment. Free exercise of religion and free speech are durable rights that do not turn on cultural popularity or political power; these freedoms enable us to coexist peacefully with each other despite deep differences. Yet these freedoms are being sorely tested today by government efforts to suppress the rights of creative professionals—painters, filmmakers, printers, and many …


A Hollow History Test: Why Establishment Clause Cases Should Not Be Decided Through Comparisons With Historical Practices, Alex J. Luchenitser, Sarah R. Goetz Jan 2019

A Hollow History Test: Why Establishment Clause Cases Should Not Be Decided Through Comparisons With Historical Practices, Alex J. Luchenitser, Sarah R. Goetz

Catholic University Law Review

Some judges, scholars, and advocates have criticized the Supreme Court’s Establishment Clause jurisprudence, arguing that existing Establishment Clause tests give courts too little guidance and too much discretion, and calling on the Court to replace those tests with a test that compares challenged practices to long-standing historically accepted ones. But such a historical-practice test would be much more difficult to apply than the Court’s current jurisprudence and would engender greater confusion among lower courts than there is now.

That’s because there are very few long-standing historical practices that are legitimate candidates for serving as evidence of the intent of the …


Contents Jan 2018

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie Jan 2018

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in turn makes an …


Table Of Contents Jan 2018

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall Jan 2018

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley Jan 2018

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley

Catholic University Journal of Law and Technology

9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …


Assessing Assisted Reproductive Technology, Raymond C. O'Brien Jan 2018

Assessing Assisted Reproductive Technology, Raymond C. O'Brien

Catholic University Journal of Law and Technology

Technological innovation possesses both opportunity and challenge. Because assisted reproductive technology (ART) involves sexual intimacy, parenthood, personhood, gender identity, privacy, legacy, and a plethora of religious, historical, sociological, and ethical underpinnings, the challenges presented in such technological innovation are substantial. Nonetheless, the opportunities are significant and progressive. Because of in vitro fertilization, gestational and genetic surrogacy, posthumous conception, and mitochondrial replacement therapy, humans now have the opportunity to overcome infertility, gender obstacles to parentage, dynastic limitations, and diseases that have long plagued mothers and infants. However, challenges include the exploitation of surrogates, unequal access to ART services, possibilities of cloning …


Privacy Of Information And Dna Testing Kits, Shanna Raye Mason Jan 2018

Privacy Of Information And Dna Testing Kits, Shanna Raye Mason

Catholic University Journal of Law and Technology

In modern times, consumers desire for more control over their own health and healthcare. With this growing interest of control, direct to consumer DNA testing kits have never been more popular. However, many consumers are unaware of the potential privacy concerns associated with such use. This comment examines the popularity and privacy risks that are likely unknown to the individual consumer. This comment also addresses the shortcomings of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the Genetic Information Nondiscrimination Act of 2008 (GINA) in regard to protecting individual’s genetic information from misuse. This comment …