Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (228)
- Science and Technology Law (218)
- Internet Law (115)
- Computer Law (73)
- Privacy Law (73)
-
- Communications Law (65)
- International Law (55)
- Law and Society (49)
- Legislation (47)
- Entertainment, Arts, and Sports Law (35)
- Legal Profession (35)
- Administrative Law (33)
- Constitutional Law (32)
- Fourth Amendment (32)
- Comparative and Foreign Law (30)
- Legal Education (29)
- Business Organizations Law (27)
- Commercial Law (27)
- Antitrust and Trade Regulation (25)
- Courts (25)
- Criminal Law (23)
- National Security Law (23)
- Social and Behavioral Sciences (23)
- Legal Ethics and Professional Responsibility (22)
- First Amendment (21)
- Banking and Finance Law (20)
- Health Law and Policy (20)
- Labor and Employment Law (20)
- State and Local Government Law (19)
- Institution
-
- Northwestern Pritzker School of Law (122)
- University of Michigan Law School (118)
- Fordham Law School (47)
- Maurer School of Law: Indiana University (36)
- Pepperdine University (28)
-
- Vanderbilt University Law School (27)
- University of Miami Law School (25)
- University of South Carolina (24)
- Marquette University Law School (23)
- U.S. Naval War College (22)
- Touro University Jacob D. Fuchsberg Law Center (18)
- Georgia State University College of Law (17)
- The Catholic University of America, Columbus School of Law (17)
- Seattle University School of Law (16)
- Duke Law (14)
- University of Richmond (14)
- St. Mary's University (12)
- Nova Southeastern University (11)
- Case Western Reserve University School of Law (10)
- New York Law School (8)
- The University of Akron (8)
- University of Massachusetts School of Law (8)
- University of New Hampshire (8)
- American University Washington College of Law (7)
- Cleveland State University (7)
- Loyola Marymount University and Loyola Law School (7)
- Saint Louis University School of Law (7)
- University of Missouri School of Law (7)
- Maurice A. Deane School of Law at Hofstra University (6)
- University of Arkansas at Little Rock William H. Bowen School of Law (6)
- Publication Year
- Publication
-
- Northwestern Journal of Technology and Intellectual Property (110)
- Michigan Telecommunications & Technology Law Review (55)
- Fordham Law Review (29)
- South Carolina Law Review (24)
- International Law Studies (22)
-
- Michigan Law Review (21)
- Federal Communications Law Journal (20)
- Pepperdine Law Review (17)
- Georgia State University Law Review (16)
- Touro Law Review (16)
- Seattle University Law Review (15)
- University of Miami Law Review (14)
- University of Richmond Law Review (14)
- Vanderbilt Journal of Entertainment & Technology Law (14)
- Duke Law & Technology Review (12)
- Fordham Intellectual Property, Media and Entertainment Law Journal (12)
- Michigan Journal of International Law (12)
- Indiana Law Journal (11)
- University of Michigan Journal of Law Reform (11)
- Vanderbilt Journal of Transnational Law (9)
- Catholic University Journal of Law and Technology (8)
- Catholic University Law Review (8)
- Marquette Sports Law Review (8)
- NYLS Law Review (8)
- Nova Law Review (8)
- The Journal of Business, Entrepreneurship & the Law (8)
- University of Massachusetts Law Review (8)
- University of Miami Inter-American Law Review (8)
- Loyola of Los Angeles Law Review (7)
- Marquette Intellectual Property Law Review (7)
Articles 1 - 30 of 811
Full-Text Articles in Law
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby
The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby
Georgia Criminal Law Review
The COVID Pandemic presented unparalleled challenges to court operations and the administration of pretrial criminal proceedings. The combination of health concerns and constitutional considerations collided in a way requiring unprecedented creativity in court operations. While scholars have given guidance on how the state courts were functioning during the pandemic, researchers have not conducted an empirical analysis on how federal courts conducted pretrial detention hearings during COVID-19.
This analysis reports the results of both qualitative and empirical findings pretrial detention hearings in federal courts during COVID-19. I examined the state of operations of the district court in several the Fourth, Fifth, …
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
Northwestern University Law Review
Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.
This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …
The Consumer Bundle, Shelly Kreiczer-Levy
The Consumer Bundle, Shelly Kreiczer-Levy
Washington Law Review
Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Washington Law Review
Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.
Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Washington Law Review Online
In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …
How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein
How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein
Emerging Writers
This paper explores the danger of emerging artificial intelligence technology perpetuating racial injustice in law enforcement and how police can ensure the protection of citizens amid this information age. We dissect a real-world case in which AI predictive policing technology resulted in alarming racial discrimination against American minority citizens. We discuss the possible explanations for this result and explore the limitations of artificial intelligence technology. Furthermore, we brainstorm methods for ensuring American citizens' just and constitutional protection as new technology is developed and tested. We propose implementing transparency laws that make the details about any policing technology and surveillance available …
The Public’S Companies, Andrew K. Jennings
The Public’S Companies, Andrew K. Jennings
Fordham Journal of Corporate & Financial Law
This Essay uses a series of survey studies to consider how public understandings of public and private companies map into urgent debates over the role of the corporation in American society. Does a social-media company, for example, owe it to its users to follow the free-speech principles embodied in the First Amendment? May corporate managers pursue environmental, social, and governance (“ESG”) policies that could reduce short-term or long-term profits? How should companies respond to political pushback against their approaches to free expression or ESG?
The studies’ results are consistent with understandings that both public and private companies have greater public …
Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle
Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle
Washington and Lee Law Review Online
In an era dominated by efficiency-driven technology, algorithms have seamlessly integrated into every facet of daily life, wielding significant influence over decisions that impact individuals and society at large. Algorithms are deliberately portrayed as impartial and automated in order to maintain their legitimacy. However, this illusion crumbles under scrutiny, revealing the inherent biases and discriminatory tendencies embedded in ostensibly unbiased algorithms. This Note delves into the pervasive issues of discriminatory algorithms, focusing on three key areas of life opportunities: housing, employment, and voting rights. This Note systematically addresses the multifaceted issues arising from discriminatory algorithms, showcasing real-world instances of algorithmic …
Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan
Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan
University of Miami Inter-American Law Review
Technology has improved society, from bridging digital divides to increasing efficiency. To power technology, energy sources were traditionally derived from diminishing and exhaustible resources like fossil fuels. The renewable energy revolution emerged to balance the global demand for technology with its impact on natural resources. Lithium is a critical, non-renewable mineral that clean technology relies on. Essentially, lithium makes renewable energy possible. As the pillar for a fossil fuel-free yet technology-driven society, it is imperative to examine the sustainability and impacts of lithium mining.
This Note discusses the legal and socio-political frameworks shaping foreign direct investments in Chile’s lithium mining …
The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman
The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman
University of Miami Law Review
The evolution of Artificial Intelligence (“A.I.”) from a speculative concept depicted in science fiction to its integration into various aspects of everyday life has brought about complex challenges for contemporary legislators. The proliferation of A.I. technology has led to a growing recognition of the need for regulation, as it poses both promises and threats to society. On the one hand, A.I. has the potential to enhance efficiency in various fields, such as medicine and automation of routine tasks. On the other hand, if left unregulated, A.I. has the potential to undermine democratic principles and infringe upon fundamental rights. Thus, legislators …
For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen
For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen
University of Miami Law Review
Freedom of speech is, unsurprisingly, foundational to the “land of the free.” However, the “land of the free” has undergone some changes since the First Amendment’s ratification. Unprecedented technological evolution has ushered in a digital forum in which the volume, speed, and reach of words transcend the Framers’ visions of the First Amendment’s aims. Social media platforms have become central spaces for public discourse, where opportunities to create—and repress—speech are endless. From enabling individuals to freely express their views, to allowing state actors to limit open exchanges, it is about time that the Supreme Court tackles this complex issue of …
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Security In The Digital Age, Michael Gentithes
Security In The Digital Age, Michael Gentithes
Akron Law Review
Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …
Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson
Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson
Dickinson Law Review (2017-Present)
In this Essay, we analyze the arguments in favor of, and against, viewing the use of copyrighted works in training sets for AI as fair use. We call this form of fair use “fair training.” We identify both strong and spurious arguments on both sides of this debate. In addition, we attempt to take a broader perspective, weighing the societal costs (e.g., replacement of certain forms of human employment) and benefits (e.g., the possibility of novel AI-based approaches to global issues such as environmental disruption) of allowing AI to make easy use of copyrighted works as training sets to facilitate …
Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl
Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl
Marquette Law Review
It has been more than a quarter century since Congress enacted twin safe harbor provisions to help protect and encourage the growth of a nascent internet by removing some liability and regulatory uncertainty. Today, there are calls for a similar safe harbor provision for blockchain, the technology behind cryptocurrencies and smart contracts. What lessons have we learned from the implementation of the internet safe harbor provisions, Section 230 of the Communications Decency Act, and Section 512 of the Digital Millennium Copyright Act? This Article charts the history of those provisions and their judicial construction over the decades. It also examines …
All Along The New Watchtower: Artificial Intelligence, Workplace Monitoring, Automation, And The National Labor Relations Act, Bradford J. Kelley
All Along The New Watchtower: Artificial Intelligence, Workplace Monitoring, Automation, And The National Labor Relations Act, Bradford J. Kelley
Marquette Law Review
Recent technological advances have dramatically expanded employers’ ability to electronically monitor and manage employees within the workplace. New technologies, including tools powered by artificial intelligence, are being used in the workplace for a wide range of purposes such as measuring employee work rates, preventing theft, and monitoring drivers with GPS tracking devices. These technologies offer potential solutions for many companies that may increase efficiencies and support operations, dramatically reduce human bias, prevent discrimination and harassment, and improve worker health and safety. Despite these potential benefits, the use of these technologies may raise concerns under the National Labor Relations Act (NLRA), …
Ethics At The Speed Of Business, James A. Doppke Jr.
Ethics At The Speed Of Business, James A. Doppke Jr.
DePaul Business & Commercial Law Journal
This paper discusses several ways in which the Illinois Rules of Professional Conduct, and the Illinois Supreme Court Rules, construct barriers that prevent lawyers and businesses from accomplishing reasonable commercial goals. Often, those barriers arise from outdated concepts, or terminology that does not reflect current business realities. The paper argues for the amendment of specific Rules to enhance lawyers’ and businesses’ respective abilities to conduct their affairs more efficiently, without sacrificing public protection in the process.
Disrupting The Narrative: Diving Deeper Into Section 230 Political Discourse, Koustubh “K.J.” Bagchi, Elizabeth Banker, Ife Ogunleye
Disrupting The Narrative: Diving Deeper Into Section 230 Political Discourse, Koustubh “K.J.” Bagchi, Elizabeth Banker, Ife Ogunleye
Pepperdine Law Review
Online spaces have undoubtedly played a significant role in facilitating discourse and the exchange of information. With this increased discourse, however, digital platforms have also seen a rise in harmful or problematic content shared online––including health misinformation, hate speech, and child sex abuse material, among others. Many commentators have put the blame for this trend on Section 230, arguing that Section 230 has enabled the spread of harmful content and suggesting that Section 230 ought to be amended or replaced. This Essay, by contrast, argues that the current narrative about Section 230 gets it wrong. In reality, Section 230 has …
Telehealth Fraud And Abuse Before And “After” The Pandemic: Are Things Going To Get Better?, Natalia Shamuel
Telehealth Fraud And Abuse Before And “After” The Pandemic: Are Things Going To Get Better?, Natalia Shamuel
DePaul Journal of Health Care Law
Telehealth and telemedicine have become increasingly useful to both patients and health care providers. The ease and comfort of attending a doctor’s appointment in the comfort of one’s own home made telehealth and telemedicine convenient, safe, and effective options for seeing a doctor during the height of the COVID-19 pandemic. However, with increased usage of telehealth and telemedicine came increased health care fraud and abuse. With increased health care fraud and abuse came increased regulations, both on the federal and state levels. This Note provides a brief analysis of health care fraud and abuse in the telehealth and telemedicine space. …
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Note: Conflicting Common Law: Application Of The Self-Incrimination Clause As Applied To Smartphone Technology, Andrew Meena
Note: Conflicting Common Law: Application Of The Self-Incrimination Clause As Applied To Smartphone Technology, Andrew Meena
ConLawNOW
This essay discusses the murkiness in the law regarding the application of the Self-Incrimination Clause as it relates to modern technology of smartphones. It evaluates the pros and cons of a judicial solution to the existing conflict against a legislative solution. Rather than through regulation or statutory reform, the focus will be on the need for a contemporary judicial interpretation of the Self-Incrimination Clause in furtherance of the common law tradition that spawned the first understandings of the Fifth Amendment. Ultimately, this examination will call upon the Supreme Court to craft a modern application of the Self-Incrimination Clause by holding …
The Lawyer's Duty Of Tech Competence Post-Covid: Why Georgia Needs A New Professional Rule Now—More Than Ever, Julia Webb
Georgia State University Law Review
The American Bar Association (ABA) promulgates the Model Rules for Professional Conduct (Model Rules), which prescribe the behavior with which lawyers must comply in demonstrating competency to practice law. In 2012, the ABA updated Comment 8 to Model Rule 1.1 to require maintaining competence in the “benefits and risks associated with relevant technology,” also known as a lawyer’s “duty of technological competence.” A decade later, the majority of state bar associations have adopted and implemented this language. Georgia, however, remains among the last ten states that have not yet formally adopted the duty of technological competence. The COVID-19 pandemic forced …
Disability Law—From Stair Flights To Websites: An Argument For Amending The Americans With Disabilities Act To Include Title Vi That Applies To Online Spaces, Amelia Hansel
University of Arkansas at Little Rock Law Review
No abstract provided.
The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page
The Microsoft Litigation’S Lessons For United States V. Google, John E. Lopatka, William H. Page
University of Miami Law Review
The United States Department of Justice (“DOJ”) and three overlapping groups of states have filed federal antitrust cases alleging Google has monopolized internet search, search advertising, internet advertising technologies, and app distribution on Android phones. In this Article, we focus on the DOJ’s claims that Google has used contracts with tech firms that distribute Google’s search services in order to exclude rival search providers and thus to monopolize the markets for search and search advertising—the two sides of Google’s search platform. The primary mechanisms of exclusion, according to the DOJ, are the many contracts Google has used to secure its …
The Freedom Of Influencing, Hannibal Travis
The Freedom Of Influencing, Hannibal Travis
University of Miami Law Review
Social media stars and the Federal Trade Commission (“FTC”) Act are clashing. Influencer marketing is a preferred way for entertainers, pundits, and everyday people to monetize their audiences and popularity. Manufacturers, service providers, retailers, and advertising agencies leverage influencers to reach into millions or even billions of consumer devices, capturing minutes or seconds of the market’s fleeting attention. FTC enforcement actions and private lawsuits have targeted influencers for failing to disclose the nature of a sponsorship relationship with a manufacturer, marketer, or service provider. Such a failure to disclose payments prominently is very common in Hollywood films and on radio …
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
Standing Up To Hackers: Article Iii Standing For Victims Of Data Breaches, Kendall Coffey
University of Miami Law Review
Despite the increasing amount of data breaches, there is no liability for parties who do not adequately protect victim’s information. In federal court, plaintiffs must show that their injury was concrete, particularized, and imminent. But, when plaintiffs’ information has been stolen, but not yet criminally used, they may be unable to establish a right to relief. Victims face challenges when seeking damage for this future harm, because despite their destroyed privacy, they may not have evidence of a perpetrator’s actual misuse of purloined data. This Article analyzes multiple court decisions, generally in the setting of class-actions, and discusses outcomes of …
Head In The Bitcloud: A Discussion On The Copyrightability And Ownership Rights In Generative Digital Art And Non-Fungible Tokens, Amanda J. Sharp
Head In The Bitcloud: A Discussion On The Copyrightability And Ownership Rights In Generative Digital Art And Non-Fungible Tokens, Amanda J. Sharp
San Diego Law Review
This Comment discusses three major copyright questions raised by non-fungible tokens (NFTs) creation and distribution in the digital art world. First, how does employing AI in the creation of generative and derivative digital art and NFTs affect the copyright requirements of authorship? Second, who is the rightful owner of an NFT image pre- and post-purchase? Finally, how does the first sale doctrine apply to NFT image purchases and are those protections enough to resolve future copyright-specific NFT claims? In Part I, an introductory example is laid out to showcase the complex issues generative and derivative digital art and NFT images …
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham
Washington Journal of Law, Technology & Arts
Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.