Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen Dec 2023

Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen

Articles

In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …


Defragging Feminist Cyberlaw, Amanda Levendowski Nov 2023

Defragging Feminist Cyberlaw, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.

In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …


Dystopian Trademark Revelations, Amanda Levendowski May 2023

Dystopian Trademark Revelations, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

Uncovering dystopian technologies is challenging. Nondisclosure agreements, procurement policies, trade secrets, and strategic obfuscation collude to shield the development and deployment of these technologies from public scrutiny until it is too late to combat them with law or policy. But occasionally, exposing dystopian technologies is simple. Corporations choose technology trademarks inspired by dystopian philosophies and novels or similar elements of real life—all warnings that their potential uses are dystopian as well. That pronouncement is not necessarily trumpeted on social media or corporate websites, however. It is revealed in a more surprising place: trademark registrations at the U.S. Patent and Trademark …


Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel Mar 2023

Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel

Joint PIJIP/TLS Research Paper Series

The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.


Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga Jan 2023

Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga

Law Faculty Publications

While patents, patent litigation, and patent pools have been part of the automotive industry since the late-1800s, the prevalence of technology covered by standards and accompanying standard essential patents (SEPs) is much more recent. Today’s smart cars and the widespread incorporation of telecommunication and Internet of Things standards in vehicles raise concerns about how well the automotive industry will be able to adapt to this new SEP-laden future. This article predicts that predatory infringement of SEPs for two related reasons. First, although some industries, such as telecommunications, have long dealt with SEPs, the incorporation of standardized technology is more recent …


Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin Jan 2023

Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin

Georgetown Law Faculty Publications and Other Works

Legal discourse in the digital public square is driven by memoranda, motions, briefs, contracts, legislation, testimony, and judicial opinions. And as lawyers are taught from their first day of law school, the strength of these genres of legal communication is built on authority. But finding that authority often depends on a duopoly of for-profit legal research resources: Westlaw and Lexis. Although contemporary legal practice relies on these databases, they are far from ethically neutral. Not only are these “data cartels” expensive-- creating significant access to justice challenges--they also are controlled by parent companies that profit by providing information to Immigration …