Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (12)
- Technology (7)
- First Amendment (5)
- Artificial intelligence (4)
- Cybersecurity (4)
-
- Internet (4)
- Social media (4)
- AI (3)
- Copyright (3)
- Data (3)
- International law (3)
- Personal Data (3)
- Regulation (3)
- Trademark (3)
- Apple (2)
- Autonomous (2)
- Blockchain (2)
- Brand (2)
- Constitutional Law (2)
- Data Privacy (2)
- Data privacy (2)
- Education (2)
- Entertainment (2)
- Evidence (2)
- FCC (2)
- FTC (2)
- Fourth Amendment (2)
- GDPR (2)
- Hacking (2)
- Insurance (2)
Articles 31 - 60 of 104
Full-Text Articles in Law
Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist
Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist
Catholic University Journal of Law and Technology
The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
Catholic University Journal of Law and Technology
The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …
Masthead, Editor-In- Chief
Masthead, Editor-In- Chief
Catholic University Journal of Law and Technology
No abstract provided.
Table Of Contents, Editor-In- Chief
Table Of Contents, Editor-In- Chief
Catholic University Journal of Law and Technology
No abstract provided.
The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Jeffery P. Langer, Neel Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz, Andrei Iancu, Patrick Kilbride, Carl J. Schramm, Colman Ragan, Ami Patel Shah, Randall R. Rader
The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Jeffery P. Langer, Neel Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz, Andrei Iancu, Patrick Kilbride, Carl J. Schramm, Colman Ragan, Ami Patel Shah, Randall R. Rader
Catholic University Journal of Law and Technology
The International Intellectual Property Commercialization Council (“IIPCC”) presented its third annual policy conference at the United States Capitol on May 6, 2019. The conference’s theme explored the question of “what is the state of innovation in the United States?” Panelists included The Honorable Andrei Iancu – Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office; Dr. Carl J. Schramm – University Professor, Syracuse University and Former President of the Ewing Marion Kauffman Foundation; Mr. Patrick Kilbride – Senior Vice President of the Global Innovation Policy Center (“GIPC”) at the U.S. Chamber of …
Closed Adoption: An Illusory Promise To Birth Parents And The Changing Landscape Of Sealed Adoption Records, Bryn Baffer
Closed Adoption: An Illusory Promise To Birth Parents And The Changing Landscape Of Sealed Adoption Records, Bryn Baffer
Catholic University Journal of Law and Technology
Imagine spitting into a tube and mailing your DNA off only to discover that you had a sibling who had been adopted by another family or that a parent’s affair had resulted in a half-sibling. For many individuals, these family secrets have been exposed due to direct-to-consumer DNA testing companies, such as 23andMe.
By the 1950s, most states had enacted statutes that sealed adoption record files in order to preserve the privacy of the birth parents, adoptees, and adoptive families. While some states have moved toward granting adoptees access to their adoption records, most states still have some type of …
How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr
How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr
Catholic University Journal of Law and Technology
In the Disney film Bambi, when the young rabbit Thumper says that Bambi “is kinda wobbly” and “doesn’t walk too good,” Thumper’s mother tells him “if you can’t say something nice, don’t say anything at all.” The Des Moines Register seems to have forgotten Thumper’s Rule when it uncovered Carson King’s teenage tweets and canceled the relationship he had built with Busch Light while raising $3 million for the Stead Family Children’s Hospital. #CancelCulture is a social media phenomenon, where some people use their voices to cancel the platform enjoyed by others. It is the 2019 equivalent of the …
Competition, Privacy, And Big Data, Stanley M. Besen
Competition, Privacy, And Big Data, Stanley M. Besen
Catholic University Journal of Law and Technology
This article analyzes the competition policy and privacy issues that are raised by large disparities in the amounts of consumer data that are held by different firms. First, it explains how competition authorities could take data acquisition into account in evaluating the effects of mergers and examines conditions under which those authorities might mandate data sharing among competitors. Next, it considers how privacy issues might be treated in analyzing whether data sharing should be permitted or mandated. Finally, it examines possible conflicts between policies that address competition and those that deal with privacy.
Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves
Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves
Catholic University Journal of Law and Technology
Cyber insurance, which covers a company’s losses and costs stemming from a cyberattack, represents a nearly $5 billion global market. But have stakeholders shaped a sustainable model? This article analyzes contrasting claims about the viability of cyber insurance. It proposes measures to ensure the survival of the cyber insurance market, which should be immediately addressed given the current state of the world and the fact that even pre-COVID-19, businesses worldwide stood to lose over $5.2 trillion over the next five years due to cybercrimes. Unless action is taken to mitigate the fallout from cyber events, the cyber insurance market will …
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast
Catholic University Journal of Law and Technology
One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.
Pre-Game Strategy For Long-Term Win: Using Trademark Registration And Right Of Publicity To Protect Esports Gamers, John Bat
Catholic University Journal of Law and Technology
The soaring popularity of esports across the globe has turned ultra-talented gamers into a blend of athlete and entertainer. The youthful esports ecosystem is exploding in growth, and the world is taking notice. But are the gamers who are eyeing professional play taking basic legal steps to develop and shield their brands, as well as bolster their collective negotiating leverage with teams, leagues, and miscellaneous entities? This note explores what features of an up-and-coming esports gamer might be worth protecting through a trademark and/or personality-rights schema, which in turn, could assist competitive gamers who are interested in developing their careers …
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
Catholic University Journal of Law and Technology
Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …
Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz
Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz
Catholic University Journal of Law and Technology
No one is certain whether Artificial Intelligence (“AI”) will make the future a better place or make it look like an apocalyptic Hollywood blockbuster. An opinion that is emerging among experts and nation-state leaders is that the nation-states that lead in AI advancements and implementation will likely have a greater influence on and power over the world economic and national security stages. The goal of this book review is to encourage the reader to enter the conversation about the role AI will play in global society and American life because AI will influence the job market in the near future. …
Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel
Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel
Catholic University Journal of Law and Technology
Deference doctrines should be understood in light of the Administrative Procedures Act’s distinction between legislative rules and interpretive rules and should be based on a solid theoretical foundation. Modern Auer deference calls for categorical deference for an agency’s regulatory interpretation of an ambiguous regulation. This is inconsistent with the APA’s characterization of the purpose of an interpretive rule. Properly construed, interpretive rules clarify the meaning of a legal text which should be justified by use of expository reasoning. These rules deserve a lesser form of deference (Skidmore deference), based on an agency’s unique understanding of its own regulations which …
Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman
Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman
Catholic University Journal of Law and Technology
Social lives are increasingly unmoored from physical location. 21st century developments in social media, virtual worlds, augmented reality, electronic financial transactions, drones, robotics, and artificial intelligence allow human beings to interact in more and more robust ways at a physical remove from their location. Meanwhile, the ubiquity of multinational corporations, global supply chains, and cloud-based data all mean that our lives are more likely to be affected by activity that is spatially distant. Virtual effects often replace direct territorial effects.
Three important consequences flow from this ubiquitous technology-enabled, data-driven virtual global societal activity. First, the territorial location of data …
How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez
How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez
Catholic University Journal of Law and Technology
This essay reviewing Striking Power, John Yoo and Jeremy Rabkin's new book on the legal and policy implications of autonomous weapons, takes issue with the book’s assumptions and; therefore its conclusions. The essay argues that, because of technological and ethical limitations, discriminate and effective use of autonomous weapons may not serve as an adequate substitute for traditional manpower-based military forces. It further argues that traditional conceptions of international law could prove more durable than Yoo and Rabkin suggest, and finally it concludes by suggesting that a grand strategy relying primarily on technological elites managing autonomous weapons actually threatens to …
Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell
Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell
Catholic University Journal of Law and Technology
As technology rapidly advances society, there are a few industries that have not been drastically impacted by disruptive technology. The financial markets are no different. Over the past ten years, algorithmic trading has quickly revolutionized the financial markets and continues to dominate an industry that for many years remained largely uninfluenced by society’s technological advances. Algorithmic trading is “a type of trading done with the use of mathematical formulas” and market data “run by powerful computers” to execute trades. One of the most commonly used platforms of algorithmic trading is high frequency trading. High frequency trading (“HFT”) uses a computerized …
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart
Catholic University Journal of Law and Technology
This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
Catholic University Journal of Law and Technology
More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …
The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara
The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara
Catholic University Journal of Law and Technology
As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.
Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji
Catholic University Journal of Law and Technology
The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …
Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman
Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman
Catholic University Journal of Law and Technology
The potential benefits that driverless automobile technology will provide to the U.S. and its roadways are vast. Greatly enhanced safety of American citizens is chief among these benefits. Congressional and administrative support will be required if these benefits are to be completely realized by American society. However, lawmakers are dragging their feet on passing legislation that will allow driverless cars to hit the road in full force. This comment examines the legislative proposals put forth by the House of Representatives and Senate. It argues that the differences between the two versions are inconsequential and urges lawmakers to act in order …
Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi
Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi
Catholic University Journal of Law and Technology
Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.
To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still …
Enforcing Constitutional Rights Through Computer Code, Steve Young
Enforcing Constitutional Rights Through Computer Code, Steve Young
Catholic University Journal of Law and Technology
Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been …
Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy
Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy
Catholic University Journal of Law and Technology
In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …
Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie
Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie
Catholic University Journal of Law and Technology
In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.
A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in turn makes an …
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat
Catholic University Journal of Law and Technology
Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.
This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …