Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 104

Full-Text Articles in Law

Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist Jan 2021

Hybrid Ip Rights For Software, Apis, And Guis: Understanding Copyright's Paradigm Shift, Howard Skaist

Catholic University Journal of Law and Technology

The non-literal scope of protection for software is intricate legally and is intricate technical. Thus, despite literally decades of court decisions and a mountain of legal scholar written on the subject in that time, it appears that there is still no consistent agreement about it, as evidenced by the Google v. Oracle which has percolated in the courts for nearly a decade and is now being heard by the US Supreme Court (oral argument was on October 7, 2020). However, the thesis of this article that a legal construct is capable of being formulated that is analytically consistent and that …


"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue Jan 2021

"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue

Catholic University Journal of Law and Technology

The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …


Masthead, Editor-In- Chief Jan 2021

Masthead, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Editor-In- Chief Jan 2021

Table Of Contents, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Jeffery P. Langer, Neel Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz, Andrei Iancu, Patrick Kilbride, Carl J. Schramm, Colman Ragan, Ami Patel Shah, Randall R. Rader Jan 2020

The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Jeffery P. Langer, Neel Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz, Andrei Iancu, Patrick Kilbride, Carl J. Schramm, Colman Ragan, Ami Patel Shah, Randall R. Rader

Catholic University Journal of Law and Technology

The International Intellectual Property Commercialization Council (“IIPCC”) presented its third annual policy conference at the United States Capitol on May 6, 2019. The conference’s theme explored the question of “what is the state of innovation in the United States?” Panelists included The Honorable Andrei Iancu – Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office; Dr. Carl J. Schramm – University Professor, Syracuse University and Former President of the Ewing Marion Kauffman Foundation; Mr. Patrick Kilbride – Senior Vice President of the Global Innovation Policy Center (“GIPC”) at the U.S. Chamber of …


Closed Adoption: An Illusory Promise To Birth Parents And The Changing Landscape Of Sealed Adoption Records, Bryn Baffer Jan 2020

Closed Adoption: An Illusory Promise To Birth Parents And The Changing Landscape Of Sealed Adoption Records, Bryn Baffer

Catholic University Journal of Law and Technology

Imagine spitting into a tube and mailing your DNA off only to discover that you had a sibling who had been adopted by another family or that a parent’s affair had resulted in a half-sibling. For many individuals, these family secrets have been exposed due to direct-to-consumer DNA testing companies, such as 23andMe.

By the 1950s, most states had enacted statutes that sealed adoption record files in order to preserve the privacy of the birth parents, adoptees, and adoptive families. While some states have moved toward granting adoptees access to their adoption records, most states still have some type of …


How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr Jan 2020

How Can We End #Cancelculture—Tort Liability Or Thumper’S Rule?, Nanci K. Carr

Catholic University Journal of Law and Technology

In the Disney film Bambi, when the young rabbit Thumper says that Bambi “is kinda wobbly” and “doesn’t walk too good,” Thumper’s mother tells him “if you can’t say something nice, don’t say anything at all.” The Des Moines Register seems to have forgotten Thumper’s Rule when it uncovered Carson King’s teenage tweets and canceled the relationship he had built with Busch Light while raising $3 million for the Stead Family Children’s Hospital. #CancelCulture is a social media phenomenon, where some people use their voices to cancel the platform enjoyed by others. It is the 2019 equivalent of the …


Competition, Privacy, And Big Data, Stanley M. Besen Jan 2020

Competition, Privacy, And Big Data, Stanley M. Besen

Catholic University Journal of Law and Technology

This article analyzes the competition policy and privacy issues that are raised by large disparities in the amounts of consumer data that are held by different firms. First, it explains how competition authorities could take data acquisition into account in evaluating the effects of mergers and examines conditions under which those authorities might mandate data sharing among competitors. Next, it considers how privacy issues might be treated in analyzing whether data sharing should be permitted or mandated. Finally, it examines possible conflicts between policies that address competition and those that deal with privacy.


Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves Jan 2020

Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves

Catholic University Journal of Law and Technology

Cyber insurance, which covers a company’s losses and costs stemming from a cyberattack, represents a nearly $5 billion global market. But have stakeholders shaped a sustainable model? This article analyzes contrasting claims about the viability of cyber insurance. It proposes measures to ensure the survival of the cyber insurance market, which should be immediately addressed given the current state of the world and the fact that even pre-COVID-19, businesses worldwide stood to lose over $5.2 trillion over the next five years due to cybercrimes. Unless action is taken to mitigate the fallout from cyber events, the cyber insurance market will …


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Pre-Game Strategy For Long-Term Win: Using Trademark Registration And Right Of Publicity To Protect Esports Gamers, John Bat Jan 2020

Pre-Game Strategy For Long-Term Win: Using Trademark Registration And Right Of Publicity To Protect Esports Gamers, John Bat

Catholic University Journal of Law and Technology

The soaring popularity of esports across the globe has turned ultra-talented gamers into a blend of athlete and entertainer. The youthful esports ecosystem is exploding in growth, and the world is taking notice. But are the gamers who are eyeing professional play taking basic legal steps to develop and shield their brands, as well as bolster their collective negotiating leverage with teams, leagues, and miscellaneous entities? This note explores what features of an up-and-coming esports gamer might be worth protecting through a trademark and/or personality-rights schema, which in turn, could assist competitive gamers who are interested in developing their careers …


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland Jan 2020

The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland

Catholic University Journal of Law and Technology

Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …


Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz Jan 2019

Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz

Catholic University Journal of Law and Technology

No one is certain whether Artificial Intelligence (“AI”) will make the future a better place or make it look like an apocalyptic Hollywood blockbuster. An opinion that is emerging among experts and nation-state leaders is that the nation-states that lead in AI advancements and implementation will likely have a greater influence on and power over the world economic and national security stages. The goal of this book review is to encourage the reader to enter the conversation about the role AI will play in global society and American life because AI will influence the job market in the near future. …


Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel Jan 2019

Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel

Catholic University Journal of Law and Technology

Deference doctrines should be understood in light of the Administrative Procedures Act’s distinction between legislative rules and interpretive rules and should be based on a solid theoretical foundation. Modern Auer deference calls for categorical deference for an agency’s regulatory interpretation of an ambiguous regulation. This is inconsistent with the APA’s characterization of the purpose of an interpretive rule. Properly construed, interpretive rules clarify the meaning of a legal text which should be justified by use of expository reasoning. These rules deserve a lesser form of deference (Skidmore deference), based on an agency’s unique understanding of its own regulations which …


Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman Jan 2019

Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman

Catholic University Journal of Law and Technology

Social lives are increasingly unmoored from physical location. 21st century developments in social media, virtual worlds, augmented reality, electronic financial transactions, drones, robotics, and artificial intelligence allow human beings to interact in more and more robust ways at a physical remove from their location. Meanwhile, the ubiquity of multinational corporations, global supply chains, and cloud-based data all mean that our lives are more likely to be affected by activity that is spatially distant. Virtual effects often replace direct territorial effects.

Three important consequences flow from this ubiquitous technology-enabled, data-driven virtual global societal activity. First, the territorial location of data …


How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez Jan 2019

How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez

Catholic University Journal of Law and Technology

This essay reviewing Striking Power, John Yoo and Jeremy Rabkin's new book on the legal and policy implications of autonomous weapons, takes issue with the book’s assumptions and; therefore its conclusions. The essay argues that, because of technological and ethical limitations, discriminate and effective use of autonomous weapons may not serve as an adequate substitute for traditional manpower-based military forces. It further argues that traditional conceptions of international law could prove more durable than Yoo and Rabkin suggest, and finally it concludes by suggesting that a grand strategy relying primarily on technological elites managing autonomous weapons actually threatens to …


Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell Jan 2019

Has Regulation Affected The High Frequency Trading Market?, Kevin O'Connell

Catholic University Journal of Law and Technology

As technology rapidly advances society, there are a few industries that have not been drastically impacted by disruptive technology. The financial markets are no different. Over the past ten years, algorithmic trading has quickly revolutionized the financial markets and continues to dominate an industry that for many years remained largely uninfluenced by society’s technological advances. Algorithmic trading is “a type of trading done with the use of mathematical formulas” and market data “run by powerful computers” to execute trades. One of the most commonly used platforms of algorithmic trading is high frequency trading. High frequency trading (“HFT”) uses a computerized …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman Jan 2019

The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman

Catholic University Journal of Law and Technology

More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …


The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara Jan 2019

The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara

Catholic University Journal of Law and Technology

As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.

Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …


Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji Jan 2019

Warrantless Searches Of Electronic Devices At U.S. Borders: Securing The Nation Or Violating Digital Liberty?, Ahad Khilji

Catholic University Journal of Law and Technology

The steady increase of U.S. citizens traveling with smart phones and other electronic devices has been met with the rise of searches and seizures by CBP officers at U.S borders. Although only less than 0.1% of all travelers may actually be subjected to a search while entering the United States, when comparing the statistics between a six month period in 2016 with the same period in 2017, electronic device searches have almost doubled from 8,383 to 14,993. Approximately one million travelers to the U.S. are inspected by the CBP every day. Out of this population, nearly 2,500 electronic devices are …


Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman Jan 2019

Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman

Catholic University Journal of Law and Technology

The potential benefits that driverless automobile technology will provide to the U.S. and its roadways are vast. Greatly enhanced safety of American citizens is chief among these benefits. Congressional and administrative support will be required if these benefits are to be completely realized by American society. However, lawmakers are dragging their feet on passing legislation that will allow driverless cars to hit the road in full force. This comment examines the legislative proposals put forth by the House of Representatives and Senate. It argues that the differences between the two versions are inconsequential and urges lawmakers to act in order …


Contents Jan 2018

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi Jan 2018

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still …


Enforcing Constitutional Rights Through Computer Code, Steve Young Jan 2018

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been …


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy Jan 2018

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie Jan 2018

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in turn makes an …


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat Jan 2018

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …