Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Law
Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy
Facing Injustice: How Face Recognition Technology May Increase The Incidence Of Misidentifications And Wrongful Convictions, Laura M. Moy
Georgetown Law Faculty Publications and Other Works
Does law enforcement use of face recognition technology paired with eyewitness identifications increase the incidence of wrongful convictions in U.S. criminal law? This Article explores this critical question and posits that the answer may be yes. Facial recognition is frequently used by law enforcement agencies to help generate investigative leads that are then presented to eyewitnesses for positive identification. But erroneous eyewitness accounts are the number one cause of wrongful convictions, and the use of face recognition to generate investigative leads may create the conditions for erroneous eyewitness identifications to take place. This is because face recognition technology is designed …
Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu
Achieving Privacy: Costs Of Compliance And Enforcement Of Data Protection Regulation, Anupam Chander, Meaza Abraham, Sandeep Chandy, Yuan Fang, Dayoung Park, Isabel Yu
Georgetown Law Faculty Publications and Other Works
Is privacy a luxury for the rich world? Remarkably, there is a dearth of literature evaluating whether data privacy is too costly for companies to implement, or too expensive for governments to enforce. This paper is the first to offer a review of surveys of costs of compliance, and to summarize national budgets for enforcement. The study shows that while privacy may indeed prove costly for companies to implement, it is not too costly for governments to enforce. This study will help inform governments as they fashion and implement privacy laws to address the “privacy enforcement gap”—the disparity between the …
From Lex Informatica To The Control Revolution, Julie E. Cohen
From Lex Informatica To The Control Revolution, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Legal scholarship on the encounter between networked digital technologies and law has focused principally on how legal and policy processes should respond to new technological developments and has spent much less time considering what that encounter might signify for the shape of legal institutions themselves. This essay focuses on the latter question. Within fields like technology studies, labor history, and economic sociology, there is a well-developed tradition of studying the ways that new information technologies and the “control revolution” they enabled—in brief, a quantum leap in the capacity for highly granular oversight and management—have elicited long-term, enduring changes in the …
Artificial Intelligence And Trade, Anupam Chander
Artificial Intelligence And Trade, Anupam Chander
Georgetown Law Faculty Publications and Other Works
Artificial Intelligence is already powering trade today. It is crossing borders, learning, making decisions, and operating cyber-physical systems. It underlies many of the services that are offered today – from customer service chatbots to customer relations software to business processes. The chapter considers AI regulation from the perspective of international trade law. It argues that foreign AI should be regulated by governments – indeed that AI must be ‘locally responsible’. The chapter refutes arguments that trade law should not apply to AI and shows how the WTO agreements might apply to AI using two hypothetical cases . The analysis reveals …
Trademarks As Surveillance Transparency, Amanda Levendowski
Trademarks As Surveillance Transparency, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
We know very little about the technologies that watch us. From cell site simulators to predictive policing algorithms, the lack of transparency around surveillance technologies makes it difficult for the public to engage in meaningful oversight. Legal scholars have critiqued various corporate and law enforcement justifications for surveillance opacity, including contract and intellectual property law. But the public needs a free, public, and easily accessible source of information about corporate technologies that might be used to watch us. To date, the literature has overlooked a free, extensive, and easily accessible source of information about surveillance technologies hidden in plain sight: …