Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

Series

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 2156

Full-Text Articles in Law

Venture Capital's Esg Problem, Ryan A. Ashburn Jan 2024

Venture Capital's Esg Problem, Ryan A. Ashburn

Law Student Publications

Venture capital (“VC”) is repeatedly described as one of the “crown jewels” of the U.S. economy for its role in financing startups and innovation. However, recent corporate scandals, including fraud, have exposed a darker side of the VC industry and the startups in which venture capitalists (“VCs”) invest. For example, Theranos received $686 million in VC funding yet proved to be nothing more than a “house of cards” once it came to light that Theranos falsified blood test results. When Theranos founder Elizabeth Holmes was convicted of fraud, many VCs tried to distance themselves, saying Theranos was an exception and …


Regulation Of Standards In Technology Markets Between Competition Policy And International Trade - The Chinese And European Experience (Foreword), Paolo Davide Farah Jan 2024

Regulation Of Standards In Technology Markets Between Competition Policy And International Trade - The Chinese And European Experience (Foreword), Paolo Davide Farah

Book Chapters

The regulation of standard setting varies significantly across regions and covering and comparing in detail the EU and Chinese regimes is an interesting decision and illustrates how two highly bureaucratic systems address the regulation of technological advancements.

The analysis demonstrates how not only legal and economic considerations play a role in the regulation of standards, but also and most importantly political ones. The “openness” of China’s standardization is a telling example in this regard. China created a specific system for standard setting and invested heavily in high-tech industries. Initially, the State backed the industry to support the creation of a …


Artificial Intelligence And Ethics .Docx, Carol Bast Jan 2024

Artificial Intelligence And Ethics .Docx, Carol Bast

EGS Content

This paper focuses on the impact that artificial intelligence has had on the practice of law and ethics rules. In some respects, the ethics rules, comments, and continuing legal education requirements incorporate knowledge of technology into the duty of attorney competence. After offering a primer on artificial intelligence and attorney ethics, the paper discusses certain proposals for revising the ethics rules, comments, and continuing legal education requirements.


New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd Jan 2024

New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd

Fellow, Adjunct, Lecturer, and Research Scholar Works

This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.

RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …


Getting Real About Protecting Privacy, Scott Skinner-Thompson Jan 2024

Getting Real About Protecting Privacy, Scott Skinner-Thompson

Publications

No abstract provided.


Legal Issues In Blockchain, Cryptocurrency, And Non-Fungible Tokens (Nfts), Christa Laser Jan 2024

Legal Issues In Blockchain, Cryptocurrency, And Non-Fungible Tokens (Nfts), Christa Laser

Law Faculty Articles and Essays

When do new technologies require changes in the law? Judge Easterbrook argued in 1996 that there is no more need for a "Law of Cyberspace" than there ever was for a "Law of the Horse." Rather, existing laws spanning multiple fields are often sufficient to cover niche factual applications and even new technological change. The same is true now for "The Law of Blockchain." Nonetheless, blockchain marketplace participants lack any cohesive, useful analysis to tum to that is neutral in outcome and performs a comprehensive analysis spanning the multitude of laws affecting the whole ecosystem. We might not need a …


Locating Liability For Medical Ai, W. Nicholson Price Ii, I. Glenn Cohen Jan 2024

Locating Liability For Medical Ai, W. Nicholson Price Ii, I. Glenn Cohen

Articles

When medical AI systems fail, who should be responsible, and how? We argue that various features of medical AI complicate the application of existing tort doctrines and render them ineffective at creating incentives for the safe and effective use of medical AI. In addition to complexity and opacity, the problem of contextual bias, where medical AI systems vary substantially in performance from place to place, hampers traditional doctrines. We suggest instead the application of enterprise liability to hospitals—making them broadly liable for negligent injuries occurring within the hospital system—with an important caveat: hospitals must have access to the information needed …


Virtual Energy, Joel B. Eisen, Felix Mormann, Heather E. Payne Jan 2024

Virtual Energy, Joel B. Eisen, Felix Mormann, Heather E. Payne

Faculty Scholarship

From employment to education, many areas of our daily lives have gone virtual, including the virtual workplace and virtual classes. By comparison, the way we generate, deliver, and consume electricity is an anachronism. And the electric industry’s outdated business model and regulatory framework are failing. For the last century-and-a-half, we have relied on ever larger power plants to generate the electricity we consume, often hundreds of miles away from the point of production. But the outsized carbon footprint of these power plants and the need to transmit their output over long distances threaten the electric grid’s reliability, affordability, and long-term …


Biomanipulation, Laura K. Donohue Jan 2024

Biomanipulation, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Scientific and technological advances in the latter part of the 20th century catapulted biometrics forward. Thus, Carleton Simon in 1935 may have postulated using retinal vasculature for biometric identification. But it took forty years for an Eyedentify patent to bring the idea to fruition. In 1937, John Henry Wigmore similarly anticipated using oscilloscopes to identify individuals by speech patterns. Decades later, digitization and speech processors made voiceprint identification possible. Biological discoveries led to the adoption of deoxyribonucleic acid (DNA) sequencing. And while Alphonse Bertillon in the late 19th century postulated iris distinctions, it was only in 1991 that …


Contract-Wrapped Property, Danielle D'Onfro Jan 2024

Contract-Wrapped Property, Danielle D'Onfro

Scholarship@WashULaw

For nearly two centuries, the law has allowed servitudes that “run with” real property while consistently refusing to permit servitudes attached to personal property. That is, owners of land can establish new, specific requirements for the property that bind all future owners—but owners of chattels cannot. In recent decades, however, firms have increasingly begun relying on contract provisions that purport to bind future owners of chattels. These developments began in the context of software licensing, but they have started to migrate to chattels not encumbered by software. Courts encountering these provisions have mostly missed their significance, focusing instead on questions …


Risky Speech Systems: Tort Liability For Ai-Generated Illegal Speech, Margot E. Kaminski Jan 2024

Risky Speech Systems: Tort Liability For Ai-Generated Illegal Speech, Margot E. Kaminski

Publications

No abstract provided.


Chatgpt, Ai Large Language Models, And Law, Harry Surden Jan 2024

Chatgpt, Ai Large Language Models, And Law, Harry Surden

Publications

This Essay explores Artificial Intelligence (AI) Large Language Models (LLMs) like ChatGPT/GPT-4, detailing the advances and challenges in applying AI to law. It first explains how these AI technologies work at an understandable level. It then examines the significant evolution of LLMs since 2022 and their improved capabilities in understanding and generating complex documents, such as legal texts. Finally, this Essay discusses the limitations of these technologies, offering a balanced view of their potential role in legal work.


Constructing Ai Speech, Margot E. Kaminski, Meg Leta Jones Jan 2024

Constructing Ai Speech, Margot E. Kaminski, Meg Leta Jones

Publications

Artificial Intelligence (AI) systems such as ChatGPT can now produce convincingly human speech, at scale. It is tempting to ask whether such AI-generated content “disrupts” the law. That, we claim, is the wrong question. It characterizes the law as inherently reactive, rather than proactive, and fails to reveal how what may look like “disruption” in one area of the law is business as usual in another. We challenge the prevailing notion that technology inherently disrupts law, proposing instead that law and technology co-construct each other in a dynamic interplay reflective of societal priorities and political power. This Essay instead deploys …


Emerging Technology's Unfamiliarity With Commercial Law, Carla L. Reyes Jan 2024

Emerging Technology's Unfamiliarity With Commercial Law, Carla L. Reyes

Faculty Journal Articles and Book Chapters

Over the course of a three-year, collaborative process that was open to the public, the Uniform Law Commission (ULC) and the American Law Institute (ALI) undertook a project to revise the Uniform Commercial Code (UCC) to account for the impact of emerging technologies on commercial transactions. The amendments, approved jointly by the ULC and ALI in July 2022, touch on aspects of the entire UCC, but one change has inspired ire and attracted national media attention: a proposed revision to the definition of “money.” The 2022 UCC Amendments alter the definition of “money” to account for the introduction of central …


Digital Rummaging, Andrew Guthrie Ferguson Jan 2024

Digital Rummaging, Andrew Guthrie Ferguson

Articles in Law Reviews & Other Academic Journals

The digital world encodes our lives with incriminating clues. How you travel, live, love, and shop are tracked through growing surveillance technologies. Police have recognized this reality and are actively exploiting new surveillance tools for investigative purposes.

The Fourth Amendment—the constitutional protection meant to limit police search powers—has not kept up with the privacy and security threats of these new digital technologies. Current doctrine has remained stymied by legal tests asking all the wrong questions about “reasonable expectations of privacy” and “trespass” searches. While the Supreme Court has acknowledged that “digital is different,” it has not yet provided a coherent …


Content Moderation On End-To-End Encrypted Systems: A Legal Analysis, Charles Duan, James Grimmelmann Jan 2024

Content Moderation On End-To-End Encrypted Systems: A Legal Analysis, Charles Duan, James Grimmelmann

Articles in Law Reviews & Other Academic Journals

Online messaging platforms like Signal and Google’s Messages increasingly use end-to-end encryption (E2EE), in which messages are encrypted on the sender’s device and decrypted on the recipient’s, so that no one else—not even the platform itself—can read them. Although E2EE protects privacy and advances human rights, the law enforcement community and others have criticized its growing use. In their view, E2EE prevents platforms and government authorities from responding to abuses and criminal activity, including child exploitation, malware, scams, and disinformation. At times, they have argued that E2EE is inherently incompatible with effective content moderation.

Computer science researchers have responded to …


Researcher Access To Social Media Data: Lessons From Clinical Trial Data Sharing, Christopher J. Morten, Gabriel Nicholas, Salomé Viljoen Jan 2024

Researcher Access To Social Media Data: Lessons From Clinical Trial Data Sharing, Christopher J. Morten, Gabriel Nicholas, Salomé Viljoen

Faculty Scholarship

For years, social media companies have sparred with lawmakers over how much independent access to platform data they should provide researchers. Sharing data with researchers allows the public to better understand the risks and harms associated with social media, including areas such as misinformation, child safety, and political polarization. Yet researcher access is controversial. Privacy advocates and companies raise the potential privacy threats of researchers using such data irresponsibly. In addition, social media companies raise concerns over trade secrecy: the data these companies hold and the algorithms powered by that data are secretive sources of competitive advantage. This Article shows …


Chapter 16: Revisioning Algorithms As A Black Feminist Project, Ngozi Okidegbe Jan 2024

Chapter 16: Revisioning Algorithms As A Black Feminist Project, Ngozi Okidegbe

Faculty Scholarship

We live in an age of predictive algorithms.1 Jurisdictions across the country are utilizing algorithms to make or influence life-altering decisions in a host of governmental decision-making processes—criminal justice, education, and social assistance to name a few.2 One justification given for this algorithmic turn concerns redressing historical and current inequalities within governmental decision-making.3 The hope is that the predictions produced by these predictive systems can correct this problem by providing decision-makers with the information needed to make fairer, more accurate, and consistent decisions.4 For instance, jurisdictions claim that their turn to risk assessment algorithms in bail, …


Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


Two Ai Truths And A Lie, Woodrow Hartzog Jan 2024

Two Ai Truths And A Lie, Woodrow Hartzog

Faculty Scholarship

Industry will take everything it can in developing Artificial Intelligence (AI) systems. We will get used to it. This will be done for our benefit. Two of these things are true and one of them is a lie. It is critical that lawmakers identify them correctly. In this Essay, I argue that no matter how AI systems develop, if lawmakers do not address the dynamics of dangerous extraction, harmful normalization, and adversarial self-dealing, then AI systems will likely be used to do more harm than good.

Given these inevitabilities, lawmakers will need to change their usual approach to regulating technology. …


Against Engagement, Neil Richards, Woodrow Hartzog Jan 2024

Against Engagement, Neil Richards, Woodrow Hartzog

Faculty Scholarship

In this Article, we focus on a key dimension of commercial surveillance by data-intensive digital platforms that is too often treated as a supporting cast member instead of a star of the show: the concept of engagement. Engagement is, simply put, a measure of time, attention, and other interactions with a service. The economic logic of engagement is simple: more engagement equals more ads watched equals more revenue. Engagement is a lucrative digital business model, but it is problematic in several ways that lurk beneath the happy sloganeering of a “free” internet

Our goal in this Article is to isolate …


Kafka In The Age Of Ai And The Futility Of Privacy As Control, Daniel Solove, Woodrow Hartzog Jan 2024

Kafka In The Age Of Ai And The Futility Of Privacy As Control, Daniel Solove, Woodrow Hartzog

Faculty Scholarship

Despite writing more than a century ago, Franz Kafka captured the core problem of digital technologies—how individuals are rendered powerless and vulnerable. Over the past fifty years, and especially in the twenty-first century, privacy laws have been sprouting up around the world. These laws are often based heavily on an Individual Control Model that aims to empower individuals with rights to help them control the collection, use, and disclosure of their data.

In this Article, we argue that although Kafka starkly shows us the plight of the disempowered individual, his work also paradoxically suggests that empowering the individual isn’t the …


The Great Scrape: The Clash Between Scraping And Privacy, Daniel J. Solove, Woodrow Hartzog Jan 2024

The Great Scrape: The Clash Between Scraping And Privacy, Daniel J. Solove, Woodrow Hartzog

Faculty Scholarship

Artificial intelligence (AI) systems depend on massive quantities of data, often gathered by “scraping” – the automated extraction of large amounts of data from the internet. A great deal of scraped data is about people. This personal data provides the grist for AI tools such as facial recognition, deep fakes, and generative AI. Although scraping enables web searching, archival, and meaningful scientific research, scraping for AI can also be objectionable or even harmful to individuals and society.

Organizations are scraping at an escalating pace and scale, even though many privacy laws are seemingly incongruous with the practice. In this Article, …


Update On Patent-Related Cases In Computers And Electronics, Karishma Jiva Cartwright, Timothy T. Hsieh, Saurabh Vishnubhakat Jan 2024

Update On Patent-Related Cases In Computers And Electronics, Karishma Jiva Cartwright, Timothy T. Hsieh, Saurabh Vishnubhakat

Faculty Articles

This paper provides an overview of patent cases relating to computer and electronics technology that were not taken up by the Supreme Court during the October 2022 term. As of this writing, the Supreme Court has not granted certiorari in any patent-related cases for its October 2021 Term. The Court has, however, called for the views of the Solictor General in four cases, indicating higher interest and raising the possibility that one or more of these cases may appear on the Court's merits docket for the October 2022 Term. Additionally, though the Court denied certiorari in Baxter v. Becton, Dickinson, …


Maurer Environmental Law Expert Is Lead Author On Science Insights Policy Forum Article, James Owsley Boyd Dec 2023

Maurer Environmental Law Expert Is Lead Author On Science Insights Policy Forum Article, James Owsley Boyd

Keep Up With the Latest News from the Law School (blog)

Environmental champions and conservationists will mark the 50th anniversary of the Endangered Species Act later this month. That is the law requiring federal agencies to use all methods necessary to prevent extinctions and ensure that federal actions not jeopardize the continued existence of species on the brink of disappearing from the face of the Earth.

In the leadup to the December 27th anniversary, several publications have begun examining the Act’s history and impact over five decades.

Science, the world’s third-most influential scholarly journal based on Google Scholar citations, invited experts from around the country to look ahead as well …


The Structure Of Secondary Copyright Liability, Felix T. Wu Dec 2023

The Structure Of Secondary Copyright Liability, Felix T. Wu

Faculty Articles

Secondary copyright liability and secondary patent liability largely parallel each other. And yet, secondary copyright cases are often quite different from secondary patent cases. Whereas most secondary patent infringers act in a way that targets a particular patent or group of related patents, secondary copyright infringement mostly arises in the context of technologies or services that work across all copyrighted works. Secondary copyright liability raises issues of platform liability in ways that secondary patent liability usually does not.

The current structure and framing of secondary copyright liability inadequately account for this distinction. The result is that secondary copyright liability tends …


Aclp - Comments To The Fcc Re Net Neutrality - December 2023, New York Law School Dec 2023

Aclp - Comments To The Fcc Re Net Neutrality - December 2023, New York Law School

Reports and Resources

No abstract provided.


Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen Dec 2023

Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen

Articles

In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …


After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge Dec 2023

After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge

Faculty Scholarship

Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …


A Public Technology Option, Hannah Bloch-Wehba Dec 2023

A Public Technology Option, Hannah Bloch-Wehba

Faculty Scholarship

Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.

Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …