Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

Technology

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 811

Full-Text Articles in Law

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby Apr 2024

The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby

Georgia Criminal Law Review

The COVID Pandemic presented unparalleled challenges to court operations and the administration of pretrial criminal proceedings. The combination of health concerns and constitutional considerations collided in a way requiring unprecedented creativity in court operations. While scholars have given guidance on how the state courts were functioning during the pandemic, researchers have not conducted an empirical analysis on how federal courts conducted pretrial detention hearings during COVID-19.

This analysis reports the results of both qualitative and empirical findings pretrial detention hearings in federal courts during COVID-19. I examined the state of operations of the district court in several the Fourth, Fifth, …


The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba Apr 2024

The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba

Northwestern University Law Review

Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.

This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …


The Consumer Bundle, Shelly Kreiczer-Levy Mar 2024

The Consumer Bundle, Shelly Kreiczer-Levy

Washington Law Review

Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real Jan 2024

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real

Washington Law Review Online

In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …


How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein Jan 2024

How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein

Emerging Writers

This paper explores the danger of emerging artificial intelligence technology perpetuating racial injustice in law enforcement and how police can ensure the protection of citizens amid this information age. We dissect a real-world case in which AI predictive policing technology resulted in alarming racial discrimination against American minority citizens. We discuss the possible explanations for this result and explore the limitations of artificial intelligence technology. Furthermore, we brainstorm methods for ensuring American citizens' just and constitutional protection as new technology is developed and tested. We propose implementing transparency laws that make the details about any policing technology and surveillance available …


The Public’S Companies, Andrew K. Jennings Dec 2023

The Public’S Companies, Andrew K. Jennings

Fordham Journal of Corporate & Financial Law

This Essay uses a series of survey studies to consider how public understandings of public and private companies map into urgent debates over the role of the corporation in American society. Does a social-media company, for example, owe it to its users to follow the free-speech principles embodied in the First Amendment? May corporate managers pursue environmental, social, and governance (“ESG”) policies that could reduce short-term or long-term profits? How should companies respond to political pushback against their approaches to free expression or ESG?

The studies’ results are consistent with understandings that both public and private companies have greater public …


Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle Dec 2023

Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle

Washington and Lee Law Review Online

In an era dominated by efficiency-driven technology, algorithms have seamlessly integrated into every facet of daily life, wielding significant influence over decisions that impact individuals and society at large. Algorithms are deliberately portrayed as impartial and automated in order to maintain their legitimacy. However, this illusion crumbles under scrutiny, revealing the inherent biases and discriminatory tendencies embedded in ostensibly unbiased algorithms. This Note delves into the pervasive issues of discriminatory algorithms, focusing on three key areas of life opportunities: housing, employment, and voting rights. This Note systematically addresses the multifaceted issues arising from discriminatory algorithms, showcasing real-world instances of algorithmic …


Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan Dec 2023

Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan

University of Miami Inter-American Law Review

Technology has improved society, from bridging digital divides to increasing efficiency. To power technology, energy sources were traditionally derived from diminishing and exhaustible resources like fossil fuels. The renewable energy revolution emerged to balance the global demand for technology with its impact on natural resources. Lithium is a critical, non-renewable mineral that clean technology relies on. Essentially, lithium makes renewable energy possible. As the pillar for a fossil fuel-free yet technology-driven society, it is imperative to examine the sustainability and impacts of lithium mining.

This Note discusses the legal and socio-political frameworks shaping foreign direct investments in Chile’s lithium mining …


The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman Oct 2023

The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman

University of Miami Law Review

The evolution of Artificial Intelligence (“A.I.”) from a speculative concept depicted in science fiction to its integration into various aspects of everyday life has brought about complex challenges for contemporary legislators. The proliferation of A.I. technology has led to a growing recognition of the need for regulation, as it poses both promises and threats to society. On the one hand, A.I. has the potential to enhance efficiency in various fields, such as medicine and automation of routine tasks. On the other hand, if left unregulated, A.I. has the potential to undermine democratic principles and infringe upon fundamental rights. Thus, legislators …


For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen Oct 2023

For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen

University of Miami Law Review

Freedom of speech is, unsurprisingly, foundational to the “land of the free.” However, the “land of the free” has undergone some changes since the First Amendment’s ratification. Unprecedented technological evolution has ushered in a digital forum in which the volume, speed, and reach of words transcend the Framers’ visions of the First Amendment’s aims. Social media platforms have become central spaces for public discourse, where opportunities to create—and repress—speech are endless. From enabling individuals to freely express their views, to allowing state actors to limit open exchanges, it is about time that the Supreme Court tackles this complex issue of …


Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray Oct 2023

Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray

Akron Law Review

This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …


Security In The Digital Age, Michael Gentithes Oct 2023

Security In The Digital Age, Michael Gentithes

Akron Law Review

Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …


Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson Oct 2023

Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson

Dickinson Law Review (2017-Present)

In this Essay, we analyze the arguments in favor of, and against, viewing the use of copyrighted works in training sets for AI as fair use. We call this form of fair use “fair training.” We identify both strong and spurious arguments on both sides of this debate. In addition, we attempt to take a broader perspective, weighing the societal costs (e.g., replacement of certain forms of human employment) and benefits (e.g., the possibility of novel AI-based approaches to global issues such as environmental disruption) of allowing AI to make easy use of copyrighted works as training sets to facilitate …


Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl Sep 2023

Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl

Marquette Law Review

It has been more than a quarter century since Congress enacted twin safe harbor provisions to help protect and encourage the growth of a nascent internet by removing some liability and regulatory uncertainty. Today, there are calls for a similar safe harbor provision for blockchain, the technology behind cryptocurrencies and smart contracts. What lessons have we learned from the implementation of the internet safe harbor provisions, Section 230 of the Communications Decency Act, and Section 512 of the Digital Millennium Copyright Act? This Article charts the history of those provisions and their judicial construction over the decades. It also examines …


All Along The New Watchtower: Artificial Intelligence, Workplace Monitoring, Automation, And The National Labor Relations Act, Bradford J. Kelley Sep 2023

All Along The New Watchtower: Artificial Intelligence, Workplace Monitoring, Automation, And The National Labor Relations Act, Bradford J. Kelley

Marquette Law Review

Recent technological advances have dramatically expanded employers’ ability to electronically monitor and manage employees within the workplace. New technologies, including tools powered by artificial intelligence, are being used in the workplace for a wide range of purposes such as measuring employee work rates, preventing theft, and monitoring drivers with GPS tracking devices. These technologies offer potential solutions for many companies that may increase efficiencies and support operations, dramatically reduce human bias, prevent discrimination and harassment, and improve worker health and safety. Despite these potential benefits, the use of these technologies may raise concerns under the National Labor Relations Act (NLRA), …


Ethics At The Speed Of Business, James A. Doppke Jr. Aug 2023

Ethics At The Speed Of Business, James A. Doppke Jr.

DePaul Business & Commercial Law Journal

This paper discusses several ways in which the Illinois Rules of Professional Conduct, and the Illinois Supreme Court Rules, construct barriers that prevent lawyers and businesses from accomplishing reasonable commercial goals. Often, those barriers arise from outdated concepts, or terminology that does not reflect current business realities. The paper argues for the amendment of specific Rules to enhance lawyers’ and businesses’ respective abilities to conduct their affairs more efficiently, without sacrificing public protection in the process.


Disrupting The Narrative: Diving Deeper Into Section 230 Political Discourse, Koustubh “K.J.” Bagchi, Elizabeth Banker, Ife Ogunleye Jul 2023

Disrupting The Narrative: Diving Deeper Into Section 230 Political Discourse, Koustubh “K.J.” Bagchi, Elizabeth Banker, Ife Ogunleye

Pepperdine Law Review

Online spaces have undoubtedly played a significant role in facilitating discourse and the exchange of information. With this increased discourse, however, digital platforms have also seen a rise in harmful or problematic content shared online––including health misinformation, hate speech, and child sex abuse material, among others. Many commentators have put the blame for this trend on Section 230, arguing that Section 230 has enabled the spread of harmful content and suggesting that Section 230 ought to be amended or replaced. This Essay, by contrast, argues that the current narrative about Section 230 gets it wrong. In reality, Section 230 has …


Telehealth Fraud And Abuse Before And “After” The Pandemic: Are Things Going To Get Better?, Natalia Shamuel May 2023

Telehealth Fraud And Abuse Before And “After” The Pandemic: Are Things Going To Get Better?, Natalia Shamuel

DePaul Journal of Health Care Law

Telehealth and telemedicine have become increasingly useful to both patients and health care providers. The ease and comfort of attending a doctor’s appointment in the comfort of one’s own home made telehealth and telemedicine convenient, safe, and effective options for seeing a doctor during the height of the COVID-19 pandemic. However, with increased usage of telehealth and telemedicine came increased health care fraud and abuse. With increased health care fraud and abuse came increased regulations, both on the federal and state levels. This Note provides a brief analysis of health care fraud and abuse in the telehealth and telemedicine space. …


Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina May 2023

Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Note: Conflicting Common Law: Application Of The Self-Incrimination Clause As Applied To Smartphone Technology, Andrew Meena Apr 2023

Note: Conflicting Common Law: Application Of The Self-Incrimination Clause As Applied To Smartphone Technology, Andrew Meena

ConLawNOW

This essay discusses the murkiness in the law regarding the application of the Self-Incrimination Clause as it relates to modern technology of smartphones. It evaluates the pros and cons of a judicial solution to the existing conflict against a legislative solution. Rather than through regulation or statutory reform, the focus will be on the need for a contemporary judicial interpretation of the Self-Incrimination Clause in furtherance of the common law tradition that spawned the first understandings of the Fifth Amendment. Ultimately, this examination will call upon the Supreme Court to craft a modern application of the Self-Incrimination Clause by holding …


The Lawyer's Duty Of Tech Competence Post-Covid: Why Georgia Needs A New Professional Rule Now—More Than Ever, Julia Webb Mar 2023

The Lawyer's Duty Of Tech Competence Post-Covid: Why Georgia Needs A New Professional Rule Now—More Than Ever, Julia Webb

Georgia State University Law Review

The American Bar Association (ABA) promulgates the Model Rules for Professional Conduct (Model Rules), which prescribe the behavior with which lawyers must comply in demonstrating competency to practice law. In 2012, the ABA updated Comment 8 to Model Rule 1.1 to require maintaining competence in the “benefits and risks associated with relevant technology,” also known as a lawyer’s “duty of technological competence.” A decade later, the majority of state bar associations have adopted and implemented this language. Georgia, however, remains among the last ten states that have not yet formally adopted the duty of technological competence. The COVID-19 pandemic forced …


Disability Law—From Stair Flights To Websites: An Argument For Amending The Americans With Disabilities Act To Include Title Vi That Applies To Online Spaces, Amelia Hansel Mar 2023

Disability Law—From Stair Flights To Websites: An Argument For Amending The Americans With Disabilities Act To Include Title Vi That Applies To Online Spaces, Amelia Hansel

University of Arkansas at Little Rock Law Review

No abstract provided.


The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page Feb 2023

The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page

University of Miami Law Review

The United States Department of Justice (“DOJ”) and three overlapping groups of states have filed federal antitrust cases alleging Google has monopolized internet search, search advertising, internet advertising technologies, and app distribution on Android phones. In this Article, we focus on the DOJ’s claims that Google has used contracts with tech firms that distribute Google’s search services in order to exclude rival search providers and thus to monopolize the markets for search and search advertising—the two sides of Google’s search platform. The primary mechanisms of exclusion, according to the DOJ, are the many contracts Google has used to secure its …


The Freedom Of Influencing, Hannibal Travis Feb 2023

The Freedom Of Influencing, Hannibal Travis

University of Miami Law Review

Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …


Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey Feb 2023

Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey

University of Miami Law Review

Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …


Head In The Bitcloud: A Discussion On The Copyrightability And Ownership Rights In Generative Digital Art And Non-Fungible Tokens, Amanda J. Sharp Jan 2023

Head In The Bitcloud: A Discussion On The Copyrightability And Ownership Rights In Generative Digital Art And Non-Fungible Tokens, Amanda J. Sharp

San Diego Law Review

This Comment discusses three major copyright questions raised by non-fungible tokens (NFTs) creation and distribution in the digital art world. First, how does employing AI in the creation of generative and derivative digital art and NFTs affect the copyright requirements of authorship? Second, who is the rightful owner of an NFT image pre- and post-purchase? Finally, how does the first sale doctrine apply to NFT image purchases and are those protections enough to resolve future copyright-specific NFT claims? In Part I, an introductory example is laid out to showcase the complex issues generative and derivative digital art and NFT images …


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.