Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Northwestern Pritzker School of Law

2022

Computer Law

Articles 1 - 2 of 2

Full-Text Articles in Law

The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor Nov 2022

The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor

Northwestern Journal of Technology and Intellectual Property

To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …


Beacons: A Viable Solution To The Ever-Evolving Problem Of Corporate Data Breaches, Lauren Fiotakis Apr 2022

Beacons: A Viable Solution To The Ever-Evolving Problem Of Corporate Data Breaches, Lauren Fiotakis

Northwestern Journal of Technology and Intellectual Property

In an increasingly virtual world, data breaches continuously plague large corporations. These companies have few options to keep their data out of the hands of persistent hackers, who often discover ways around any safeguards that may be in place. It seems as though any measures companies are currently able to employ merely delay the inevitable breach that will bring with it the potential loss of both customers’ data and their faith in the privacy and security of their information. These attacks can be debilitating to corporations; thus, it seems only fair to provide them the ability to take active measures …