Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Series

2020

Institution
Keyword
Publication

Articles 1 - 30 of 72

Full-Text Articles in Law

Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar Dec 2020

Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar

Articles & Book Chapters

This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …


Is The Digital Economy Too Concentrated?, Jonathan Klick Nov 2020

Is The Digital Economy Too Concentrated?, Jonathan Klick

All Faculty Scholarship

Concentration in the digital economy in the United States has sparked loud criticism and spurred calls for wide-ranging reforms. These reforms include everything from increased enforcement of existing antitrust laws, such as challenging more mergers and breaking up firms, to an abandonment of the consumer welfare standard. Critics cite corruption and more systemic public choice problems, while others invoke the populist origins of antitrust to slay the digital Goliaths. On the other side, there is skepticism regarding these arguments. This chapter continues much of that skepticism.


Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran Nov 2020

Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran

Articles

This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …


Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz Nov 2020

Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz

Articles

A specter is haunting notice-and-comment rulemaking—the specter of fraudulent comments. The stand-out example—the apotheosis—was the Federal Communications Commission’s (FCC) net neutrality rulemaking in 2017. Well over twenty million comments were submitted, but millions of those were highly suspect. It turns out only about 800,000 of those comments were unique—that is, not written by a computer and not a pre-written form letter or variation thereof. And of the rest, perhaps half were submitted by computers (bots) using fictitious names or the names of real people, living and dead, who had no connection to the comment.


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Executive Order No. 13925: An Attempted Stop Sign On Our Global Cyber-Freeway, Robert C. Montañez Oct 2020

Executive Order No. 13925: An Attempted Stop Sign On Our Global Cyber-Freeway, Robert C. Montañez

GGU Law Review Blog

The year 2020 has brought times of physical isolation and the world has turned to the Internet as a bridge to normalcy. It is not uncommon for a person to wake up and grab his or her phone and consult it (rather than a newspaper) to gather news, browse through friends’ video “stories” shared overnight, check what is “trending” via Twitter, or even stream a popular video on YouTube. During the COVID-19 pandemic, the Internet is more important than ever before and its key to success is its immediacy. On May 26, 2020, without any supporting evidence, President Trump …


Who's Afraid Of Section 1498? A Case For Government Patent Use In Pandemics And Other National Crisis, Charles Duan, Christopher J. Morten Oct 2020

Who's Afraid Of Section 1498? A Case For Government Patent Use In Pandemics And Other National Crisis, Charles Duan, Christopher J. Morten

Articles in Law Reviews & Other Academic Journals

COVID-19 has created pressing and widespread needs for vaccines, medical treatments, PPE, and other medical technologies, needs that may conflict--indeed, have already begun to conflict--with the exclusive rights conferred by United States patents. The U.S. government has a legal mechanism to overcome this conflict: government use of patented technologies at the cost of government paid compensation under 28 U. S.C. § 1498. But while many have recognized the theoretical possibility of government patent use under that statute, there is today conventional wisdom that § 1498 is too exceptional, unpredictable, and dramatic for practical use, to the point that it ought …


Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer Oct 2020

Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer

Seattle University Law Review SUpra

No abstract provided.


Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn Sep 2020

Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman Aug 2020

Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman

Joint PIJIP/TLS Research Paper Series

The Covid-19 pandemic has illustrated the importance of accurate, real-time information and empirical data in a rapidly evolving crisis. Yet it has also captured an opposite issue: the spread of misinformation and disinformation during a public health crisis. Numerous governments have used the Covid-19 pandemic as reason to, legitimately or illegitimately, heighten existing state censorship practices or introduce new practices entirely under the justification of stopping false information about the virus. This report analyzes developments in China, India, and Russia as case studies of government censorship amid the public health crisis. It offers five key takeaways from these case studies. …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


Syllabus For Issues In Law Enforcement: Cybersecurity And Public Interest Technology, Amy J. Ramson Jul 2020

Syllabus For Issues In Law Enforcement: Cybersecurity And Public Interest Technology, Amy J. Ramson

Open Educational Resources

This is a syllabus for a course in Issues in Law Enforcement. The curriculum is a public interest technology course in cybersecurity. Principally, the federal government handles cybersecurity investigations along with some state governments and the FBI acts as the center for all cybersecurity complaints.

The course expands beyond law enforcement and provides a comprehensive background to the field through the following presentations: a history of cybersecurity; an explanation of the Internet; an introduction to cybercrime and cybersecurity techniques; the legal environment, which includes a survey of law enforcement and prosecution departments and agencies, and federal and NY state criminal, …


Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson Jul 2020

Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson

Open Educational Resources

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.


Towards A Data-Driven Financial System: The Impact Of Covid-19, Nydia Remolina Jul 2020

Towards A Data-Driven Financial System: The Impact Of Covid-19, Nydia Remolina

Centre for AI & Data Governance

The COVID-19 outbreak has a growing impact on the global economy and the financial sector, which plays a critical role in mitigating the unprecedented macroeconomic and financial shock caused by the pandemic. Given the unprecedented nature of the current crisis, financial regulators and supervisors, central banks, along with governments and legislatures face challenges to maintain financial stability, preserve the well-functioning core markets, and ensure the flow of credit to the real economy. Even though the COVID-19 has slowed down our daily lives and stopped the operation of many industries, it did not have the same effect in the data-driven finance …


Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan Jul 2020

Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan

Joint PIJIP/TLS Research Paper Series

Global platforms such as YouTube, Facebook, Instagram or TikTok live on users ‘freely’ sharing content, in exchange for the data generated in the process. Many of these digital market actors nowadays employ automated copyright enforcement tools, allowing those who claim ownership to identify matching content uploaded by users. While most debates on state-sanctioned platform liability and automated private ordering by platforms has focused on the implications of user generated content being blocked, this paper places a spotlight on monetization. Using YouTube’s Content ID as principal example, I show how monetizing user content is by far the norm, and blocking the …


Artificial Financial Intelligence, William Magnuson Jul 2020

Artificial Financial Intelligence, William Magnuson

Faculty Scholarship

Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in …


Regulatory Approaches To Consumer Protection In The Financial Sector And Beyond: Toward A Smart Disclosure Regime?, Nydia Remolina, Aurelio Gurrea-Martinez, Yvonne Ai-Chi Loh, David R. Hardoon May 2020

Regulatory Approaches To Consumer Protection In The Financial Sector And Beyond: Toward A Smart Disclosure Regime?, Nydia Remolina, Aurelio Gurrea-Martinez, Yvonne Ai-Chi Loh, David R. Hardoon

Centre for AI & Data Governance

Traditionally, consumer and data protection policies evolved from issues of consent and information disclosure. The purpose of these regulatory approaches is the protection of consumers by reducing some contracting failures, such as asymmetries of information and a lower bargaining power, especially in transactions involving complex issues such as financial products and sensitive personal data. In the past, regulators have responded to privacy and consumer protection by adopting what this paper refers to as an “imperfectly informed regime”, in which consumers do not receive full information about the risks associated with their decisions, even if they are still protected through a …


Regulating Personal Data Usage In Covid-19 Control Conditions, Mark Findlay, Nydia Remolina May 2020

Regulating Personal Data Usage In Covid-19 Control Conditions, Mark Findlay, Nydia Remolina

Centre for AI & Data Governance

As the COVID-19 health pandemic ebbs and flows world-wide, governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have capacity to amass and share personal data for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside times of real and present personal danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission (provided that the technology …


Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan May 2020

Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan

Articles in Law Reviews & Other Academic Journals

It was certainly an odd thing for the Department of Justice attorney arguing for the United States to appear before the Ninth Circuit to tell the appellate judges that a federal agency was wrong. This was what happened in a Federal Trade Commission enforcement action against Qualcomm Inc., a semiconductor technology company. As a substantial holder of patents on mobile communications technologies and also a leading manufacturer of chips used in that same industry, the FTC charged Qualcomm with anticompetitive conduct; the district court agreed and enjoined Qualcomm from certain patent licensing practices. It was that award of injunctive relief …


Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham May 2020

Ethics, Ai, Mass Data And Pandemic Challenges: Responsible Data Use And Infrastructure Application For Surveillance And Pre-Emptive Tracing Post-Crisis, Mark Findlay, Jia Yuan Loke, Nydia Remolina Leon, Yum Yin, Benjamin (Tan Renyan) Tham

Research Collection Yong Pung How School Of Law

As the COVID-19 health pandemic rages governments and private companies across the globe are utilising AI-assisted surveillance, reporting, mapping and tracing technologies with the intention of slowing the spread of the virus. These technologies have the capacity to amass personal data and share for community control and citizen safety motivations that empower state agencies and inveigle citizen co-operation which could only be imagined outside such times of real and present danger. While not cavilling with the short-term necessity for these technologies and the data they control, process and share in the health regulation mission, this paper argues that this infrastructure …


House Judiciary Inquiry Into Competition In Digital Markets: Statement, Herbert J. Hovenkamp Apr 2020

House Judiciary Inquiry Into Competition In Digital Markets: Statement, Herbert J. Hovenkamp

All Faculty Scholarship

This is a response to a query from the Judiciary Committee of the U.S. House of Representatives, requesting my views about the adequacy of existing antitrust policy in digital markets.

The statutory text of the United States antitrust laws is very broad, condemning all anticompetitive restraints on trade, monopolization, and mergers and interbrand contractual exclusion whose effect “may be substantially to lessen competition or tend to create a monopoly.” Federal judicial interpretation is much narrower, however, for several reasons. One is the residue of a reaction against excessive antitrust enforcement in the 1970s and earlier. However, since that time antitrust …


Global Challenges And Regulatory Strategies To Fintech, Aurelio Gurrea-Martinez, Nydia Remolina Apr 2020

Global Challenges And Regulatory Strategies To Fintech, Aurelio Gurrea-Martinez, Nydia Remolina

Centre for AI & Data Governance

The rise of new technologies has changed the operation, regulation and supervision of financial markets, bringing new challenges and opportunities for consumers, regulators, and financial institutions. This Article seeks to explore the most common regulatory strategies used by financial regulators around the world to address the challenges associated with the rise of fintech. These strategies include the imposition of bans, regulatory passivity, adoption of new legislation, permission on a case by case basis, and more interactive approaches such as innovation offices, accelerators and sandboxes. This Article argues that the adoption and desirability of each regulatory approach will depend on a …


A Third-Party Doctrine For Digital Metadata, H. Brian Holland Apr 2020

A Third-Party Doctrine For Digital Metadata, H. Brian Holland

Faculty Scholarship

For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …


Exploring The Esports Approach Of America's Three Major Leagues, Peter A. Carfagna Apr 2020

Exploring The Esports Approach Of America's Three Major Leagues, Peter A. Carfagna

Articles

No abstract provided.


Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood Apr 2020

Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood

Independent Study Project (ISP) Collection

The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …


The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz Apr 2020

The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz

Georgetown Law Faculty Publications and Other Works

The International Intellectual Property Commercialization Council (“IIPCC”) presented its third annual policy conference at the United States Capitol on May 6, 2019. The conference’s theme explored the question of “what is the state of innovation in the United States?” Panelists included The Honorable Andrei Iancu – Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office; Dr. Carl J. Schramm – University Professor, Syracuse University and Former President of the Ewing Marion Kauffman Foundation; Mr. Patrick Kilbride – Senior Vice President of the Global Innovation Policy Center (“GIPC”) at the U.S. Chamber of …


New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue Mar 2020

New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

New media facilitates communication and creates a common, lived experience. It also carries the potential for great harm on an individual and societal scale. Posting integrates information and emotion, with study after study finding that fear and anger transfer most readily online. Isolation follows, with insular groups forming. The result is an increasing bifurcation of society. Scholars also write about rising levels of depression and suicide that stem from online dependence and replacing analogical experience with digital interaction, as well as escalating levels of anxiety that are rooted in the validation expectation of the ‘like’ function. These changes generate instability …