Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 6 of 6
Full-Text Articles in Law
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Articles
In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Dystopian Trademark Revelations, Amanda Levendowski
Dystopian Trademark Revelations, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Uncovering dystopian technologies is challenging. Nondisclosure agreements, procurement policies, trade secrets, and strategic obfuscation collude to shield the development and deployment of these technologies from public scrutiny until it is too late to combat them with law or policy. But occasionally, exposing dystopian technologies is simple. Corporations choose technology trademarks inspired by dystopian philosophies and novels or similar elements of real life—all warnings that their potential uses are dystopian as well. That pronouncement is not necessarily trumpeted on social media or corporate websites, however. It is revealed in a more surprising place: trademark registrations at the U.S. Patent and Trademark …
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series
The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.
Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga
Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga
Law Faculty Publications
While patents, patent litigation, and patent pools have been part of the automotive industry since the late-1800s, the prevalence of technology covered by standards and accompanying standard essential patents (SEPs) is much more recent. Today’s smart cars and the widespread incorporation of telecommunication and Internet of Things standards in vehicles raise concerns about how well the automotive industry will be able to adapt to this new SEP-laden future. This article predicts that predatory infringement of SEPs for two related reasons. First, although some industries, such as telecommunications, have long dealt with SEPs, the incorporation of standardized technology is more recent …
Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin
Disrupting Data Cartels By Editing Wikipedia, Eun Hee Han, Amanda Levendowski, Jonah Perlin
Georgetown Law Faculty Publications and Other Works
Legal discourse in the digital public square is driven by memoranda, motions, briefs, contracts, legislation, testimony, and judicial opinions. And as lawyers are taught from their first day of law school, the strength of these genres of legal communication is built on authority. But finding that authority often depends on a duopoly of for-profit legal research resources: Westlaw and Lexis. Although contemporary legal practice relies on these databases, they are far from ethically neutral. Not only are these “data cartels” expensive-- creating significant access to justice challenges--they also are controlled by parent companies that profit by providing information to Immigration …