Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Machine Speech: Towards A Unified Doctrine Of Attribution And Control, Brian Sites May 2024

Machine Speech: Towards A Unified Doctrine Of Attribution And Control, Brian Sites

University of Miami Law Review

Like many courts across the country in 2023, courts in the Eleventh Circuit were met with novel claims challenging ChatGPT and other artificial intelligence tools. These cases raise common questions: How should courts treat the speech of machines? When a machine generates allegedly defamatory material, who is the speaker—mortal or machine? When a machine generates expressive creations, who is the artist, and does that shape copyright eligibility? When a machine makes assertions about reality through lab analyses and other forensic reports, who is the accuser, and how does the answer impact a defendant’s rights at trial? Should those answers stem …


Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod Apr 2024

Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod

University of Miami Law Review

Cyberattacks, data breaches, and ransomware continue to pose major threats to businesses, governments, and health and educational institutions worldwide. Ongoing successful instances of cybercrime involve sophisticated attacks from diverse sources such as organized crime syndicates, actors engaged in industrial espionage, nation-states, and even lone wolf actors having relatively few resources. Technological innovation continues to outpace the ability of U.S. law to keep pace, though other jurisdictions including the European Union have been more proactive. Nation-state and international criminal group ransomware attacks continue; Sony’s systems were hacked by a ransomware group; MGM Resorts disclosed that recovery from their September 2023 hack …


The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


Family Secrets And Relational Privacy: Protecting Not-So-Personal, Sensitive Information From Public Disclosure, J. Lyn Entrikin Apr 2020

Family Secrets And Relational Privacy: Protecting Not-So-Personal, Sensitive Information From Public Disclosure, J. Lyn Entrikin

University of Miami Law Review

This Article seeks to map contemporary relational privacy issues in the context of the evolving “right of privacy” in the United States. Generally, the Article explains why the so-called “personal” right of informational privacy, whatever its legal foundations, cannot be realistically confined to an individual right given the dramatic scientific and technological developments in the twenty-first century. In particular, the Article proposes that both state and federal law must grapple with the inherently relational nature of privacy interests with respect to DNA profiles, which inherently implicate the privacy interests of one’s biological relatives, whether known or unknown.

Part I summarizes …


The Struggle To Define Privacy Rights And Liabilities In A Digital World And The Unfortunate Role Of Constitutional Standing, Juan Olano Apr 2018

The Struggle To Define Privacy Rights And Liabilities In A Digital World And The Unfortunate Role Of Constitutional Standing, Juan Olano

University of Miami Law Review

Today’s world runs on data. The creation and improvement of technological products and services depend on the exchange of data between people and companies. As people’s lives become more digitized, companies can collect, store, and analyze more data, and in turn, create better technology. But, because consumer data can be very sensitive (think Social Security numbers, GPS location, fingerprint recognition, etc.) this cyclical exchange comes with serious privacy risks; especially in light of more frequent and sophisticated cyberattacks. This creates a face-off between technological growth and privacy rights. While it makes sense that people should be willing to subside some …


Industrial Cyber Vulnerabilities: Lessons From Stuxnet And The Internet Of Things, Lawrence J. Trautman, Peter C. Ormerod Apr 2018

Industrial Cyber Vulnerabilities: Lessons From Stuxnet And The Internet Of Things, Lawrence J. Trautman, Peter C. Ormerod

University of Miami Law Review

Cyber breaches continue at an alarming pace with new vulnerability warnings an almost daily occurrence. Discovery of the industrial virus Stuxnet during 2010 introduced a global threat of malware focused toward disruption of industrial control devices. By the year 2020, it is estimated that over 30 billion Internet of Things (IoT) devices will exist. The IoT global market spend is estimated to grow from $591.7 billion in 2014 to $1.3 trillion in 2019 with a compound annual growth rate of 17%. The installed base of IoT endpoints will grow from 9.7 billion in 2014 to more than 25.6 billion in …