Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Articles in Law Reviews & Other Academic Journals

Technology

Articles 1 - 22 of 22

Full-Text Articles in Law

Persistent Surveillance, Andrew Guthrie Ferguson Jan 2022

Persistent Surveillance, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions.

In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs …


Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes Jul 2021

Blockchain & Secured Transactions Proceedings Of The 2021 Spring Conference: The Impact Of Blockchain On The Practice Of Law: Presentation 4, Heather Hughes

Articles in Law Reviews & Other Academic Journals

Secured transactions are governed by Uniform Commercial Code Article 9. UCC Article 9 governs any extension of credit secured by personalty. If you think about it, this statute governs a massive swath of market activity: secured credit facilities, margin trading of securities, asset securitizations, and purchase money transactions for goods, I could name more. But it's a statute that's very wide ranging. Given this expansive scope, blockchain-based transaction platforms have numerous implications for lawyers who deal with secured transactions. In my brief time here, I'm going to identify just two of them.


A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan Jan 2021

A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …


Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan Jan 2021

Hacking Antitrust: Competition Policy And The Computer Fraud And Abuse Act, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer "without authorization or exceeding authorized access," has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals split on the proper construction and the Supreme Courtset to consider the law in its current October Term 2020.

This article considers the CFAA in a new light, namely its effects on competition. Rather than merely preventing injurious trespass upon computers, …


Facial Recognition And The Fourth Amendment, Andrew Ferguson Jan 2021

Facial Recognition And The Fourth Amendment, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Facial recognition offers a totalizing new surveillance power. Police now have the capability to monitor, track, and identify faces through networked surveillance cameras and datasets of billions of images. Whether identifying a particular suspect from a still photo, or identifying every person who walks past a digital camera, the privacy and security impacts of facial recognition are profound and troubling.

This Article explores the constitutional design problem at the heart of facial recognition surveillance systems. One might hope that the Fourth Amendment – designed to restrain police power and enacted to limit governmental overreach – would have something to say …


Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan Jul 2020

Gene Patents, Drug Prices, And Scientific Research: Unexpected Effects Of Recently Proposed Patent Eligibility Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

Recently, Congress has considered legislation to amend§ 101, a section of the Patent Act that the Supreme Court has held to prohibit patenting of laws of nature, natural phenomena, and abstract ideas. This draft legislation would expand the realm of patent-eligible subject matter, overturning the Court's precedents along the way. The draft legislation, and movement to change this doctrine of patent law, made substantial headway with a subcommittee of the Senate holding numerous roundtables and hearings on the subject.

This article considers some less-discussed consequences of that draft legislative proposal. The legislation likely opens the door to patenting of subject …


Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan Jan 2019

Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan

Articles in Law Reviews & Other Academic Journals

You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.

Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …


Atrocity Prevention In The New Media Landscape, Rebecca Hamilton Jan 2019

Atrocity Prevention In The New Media Landscape, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Journalists have traditionally played a crucial role in building public pressure on government officials to uphold their legal obligations under the 1948 UN Convention on the Prevention and Punishment of Genocide. But over the past twenty years there has been radical change in the media landscape: foreign bureaus have been shuttered, young freelance journalists have taken over some of the work traditionally done by experienced foreign correspondents, and, more recently, the advent of social media has enabled people in conflict-affected areas to tell their own stories to the world. This essay assesses the impact of these changes on atrocity prevention …


Supreme Court Of Canada On The Appropriateness And Scope Of A Global Website Takedown Order, Jennifer C. Daskal Oct 2018

Supreme Court Of Canada On The Appropriateness And Scope Of A Global Website Takedown Order, Jennifer C. Daskal

Articles in Law Reviews & Other Academic Journals

In Google v. Equustek, the Supreme Court of Canada ordered Google to delist all websites used by Datalink, a company that stole trade secrets from Equustek, a Canada-based information technology company. Google had agreed to do so in part, but with respect to searches that originated from google.ca only, the default browser for those in Canada. Equustek however, argued the takedowns needed to be global in order to be effective. It thus sought an injunction ordering Google to delist the allegedly infringing websites from all of Google's search engines whether accessed from google.ca, google.com, or any other entry point. Google …


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


Illuminating Black Data Policing, Andrew Ferguson Jan 2018

Illuminating Black Data Policing, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

The future of policing will be driven by data. Crime, criminals, and patterns of criminal activity will be reduced to data to be studied, crunched, and predicted. The benefits of big data policing involve smarter policing, faster investigation, predictive deterrence, and the ability to visualize crime problems in new ways. Not surprisingly then, police administrators have been seeking out new partnerships with sophisticated private data companies and experimenting with new surveillance technologies. This potential future, however, has a very present limitation. It is a limitation largely ignored by adopting jurisdictions and could, if left unaddressed, delegitimize the adoption and use …


Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor Jan 2018

Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor

Articles in Law Reviews & Other Academic Journals

In Sorerejgntyin Cyberspace: Lex Lata Vel Non?, Michael Schmitt and Liis Vihul argue that territorial sovereignty is a primary rule of international law that limits cyber activities. They recognize, however, that not all cyber effects constitute violations of territorial sovereignty, and like Rule 4 in the Tallinn Manual 2.0 and its commentary, they acknowledge a distinct lack of consensus among the Tallinn participants on the critical question of applicable thresholds. Problematically, they do not identify the necessary state practice and opinio juris that would be required to establish either the primary rule that they proffer or the existence and contours …


Sovereignty In The Age Of Cyber, Gary Corn Jan 2018

Sovereignty In The Age Of Cyber, Gary Corn

Articles in Law Reviews & Other Academic Journals

International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.


Policing Predictive Policing, Andrew Ferguson Jan 2017

Policing Predictive Policing, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Predictive policing is sweeping the nation, promising the holy grail of policing – preventing crime before it happens. Police have embraced predictive analytics and data-driven metrics to improve law enforcement tactics, practice, and strategy. Predictive “hot spots” become targets for intensive police surveillance. Targeted “hot people” become suspects. In big cities and small towns, data-based predictions drive police patrol schedules. Risk assessment algorithms target suspicious individuals. Increased data collection fuels a growing feedback loop requiring more robust data crunching systems.All of these predictive innovations share one thing in common: a belief that crime can be understood by identifying and analyzing …


Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson Jan 2017

Carpenter V. United States: Brief Of Scholars Of Criminal Procedure And Privacy As Amici Curiae In Support Of Petitioner, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Amici curiae are forty-two scholars engaged in significant research and/or teaching on criminal procedure and privacy law. This brief addresses issues that are within amici’s particular areas of scholarly expertise. They have a shared interest in clarifying the law of privacy in the digital era, and believe that a review of scholarly literature on the topic is helpful to answering the question in this case. This brief is co-authored by Harry Sandick, Kathrina Szymborski, & Jared Buszin of Patterson Belknap Webb & Tyler LLP.Carpenter v. United States presents an opportunity to reconsider the Fourth Amendment in the digital age. Cell …


The Big Data Jury, Andrew Ferguson Jan 2016

The Big Data Jury, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article addresses the disruptive impact of big data technologies on jury selection.Jury selection requires personal information about potential jurors. Current selection practices, however, collect very little information about citizens, and litigants picking jury panels know even less. This data gap results in a jury selection system that: (1) fails to create a representative cross-section of the community; (2) encourages the discriminatory use of peremptory challenges; (3) results in an unacceptably high juror “no show” rate; and (4) disproportionately advantages those litigants who can afford to hire expensive jury consultants.Big data has the potential to remedy these existing limitations and …


Internet Freedom With Teeth, Charles Duan Jan 2015

Internet Freedom With Teeth, Charles Duan

Articles in Law Reviews & Other Academic Journals

"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."

So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …


Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson Jan 2014

Personal Curtilage: Fourth Amendment Security In Public, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

Do citizens have any Fourth Amendment protection from sense-enhancing surveillance technologies in public? This article engages a timely question as new surveillance technologies have redefined expectations of privacy in public spaces.This article proposes a new theory of Fourth Amendment security based on the ancient theory of curtilage protection for private property. Curtilage has long been understood as a legal fiction that expands the protection of the home beyond the formal structures of the house. Curtilage recognizes a buffer zone beyond the four corners of the home that deserves protection, even in public, even if accessible to public view. Based on …


On The Opposition Of Practical And Theoretical, Elizabeth Earle Beske Jan 2011

On The Opposition Of Practical And Theoretical, Elizabeth Earle Beske

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Alternative Software Protection In View Of In Re Bilski, Charles Duan, Lauren Katzenellenbogen, James Skelley Jul 2009

Alternative Software Protection In View Of In Re Bilski, Charles Duan, Lauren Katzenellenbogen, James Skelley

Articles in Law Reviews & Other Academic Journals

The United States Court of Appeals for the Federal Circuit's (CAFC) en banc decision, In re Bilski, redefined the standard for patenting processes including business methods and computer software. In Bilski, the Federal Circuit departed from the "useful, concrete, and tangible result" test it had established in State Street Bank & Trust Co. v. SignatureFinancialGroup,Inc., which had been the standard for the past ten years. The Federal Circuit returned to a test articulated nearly 40 years ago by the Supreme Court in Gottschalk v. Benson, and clarified that State Street was "never intended to supplant the Supreme Court's test.", Under …


Why Did The Antitrust Agencies Embrace Unilateral Effects, Jonathan Baker Jan 2003

Why Did The Antitrust Agencies Embrace Unilateral Effects, Jonathan Baker

Articles in Law Reviews & Other Academic Journals

No abstract provided.


A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn Jan 1995

A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn

Articles in Law Reviews & Other Academic Journals

No abstract provided.