Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Law
The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman
The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman
University of Miami Law Review
The evolution of Artificial Intelligence (“A.I.”) from a speculative concept depicted in science fiction to its integration into various aspects of everyday life has brought about complex challenges for contemporary legislators. The proliferation of A.I. technology has led to a growing recognition of the need for regulation, as it poses both promises and threats to society. On the one hand, A.I. has the potential to enhance efficiency in various fields, such as medicine and automation of routine tasks. On the other hand, if left unregulated, A.I. has the potential to undermine democratic principles and infringe upon fundamental rights. Thus, legislators …
For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen
For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen
University of Miami Law Review
Freedom of speech is, unsurprisingly, foundational to the “land of the free.” However, the “land of the free” has undergone some changes since the First Amendment’s ratification. Unprecedented technological evolution has ushered in a digital forum in which the volume, speed, and reach of words transcend the Framers’ visions of the First Amendment’s aims. Social media platforms have become central spaces for public discourse, where opportunities to create—and repress—speech are endless. From enabling individuals to freely express their views, to allowing state actors to limit open exchanges, it is about time that the Supreme Court tackles this complex issue of …
The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page
The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page
University of Miami Law Review
The United States Department of Justice (“DOJ”) and three overlapping groups of states have filed federal antitrust cases alleging Google has monopolized internet search, search advertising, internet advertising technologies, and app distribution on Android phones. In this Article, we focus on the DOJ’s claims that Google has used contracts with tech firms that distribute Google’s search services in order to exclude rival search providers and thus to monopolize the markets for search and search advertising—the two sides of Google’s search platform. The primary mechanisms of exclusion, according to the DOJ, are the many contracts Google has used to secure its …
The Freedom Of Influencing, Hannibal Travis
The Freedom Of Influencing, Hannibal Travis
University of Miami Law Review
Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
University of Miami Law Review
Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …