Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 158

Full-Text Articles in Law

Table Of Contents, Editor-In- Chief Jan 2021

Table Of Contents, Editor-In- Chief

Catholic University Journal of Law and Technology

No abstract provided.


Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast Jan 2020

Privacy, Eavesdropping, And Wiretapping Across The United States: Reasonable Expectation Of Privacy And Judicial Discretion, Carol M. Bast

Catholic University Journal of Law and Technology

One-party consent and all-party consent eavesdropping and wiretapping statutes are two broad pathways for legislation to deal with the problem of secret taping and some states protect conversation under state constitutions. Whether a conversation is protected against being taped as a private conversation is often gauged by the reasonable expectation of privacy standard. Judges in both all-party consent and one-party consent jurisdictions have had to use their leeway under the reasonable expectation of privacy standard to arrive at what at the time seemed to be the most appropriate solution, perhaps in doing so creating a case law exception.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel Jan 2019

Auer Deference Should Be Dead; Long Live Seminole Rock Deference, John B. Meisel

Catholic University Journal of Law and Technology

Deference doctrines should be understood in light of the Administrative Procedures Act’s distinction between legislative rules and interpretive rules and should be based on a solid theoretical foundation. Modern Auer deference calls for categorical deference for an agency’s regulatory interpretation of an ambiguous regulation. This is inconsistent with the APA’s characterization of the purpose of an interpretive rule. Properly construed, interpretive rules clarify the meaning of a legal text which should be justified by use of expository reasoning. These rules deserve a lesser form of deference (Skidmore deference), based on an agency’s unique understanding of its own regulations which …


Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman Jan 2019

Legal Jurisdiction And Virtual Social Life, Paul Schiff Berman

Catholic University Journal of Law and Technology

Social lives are increasingly unmoored from physical location. 21st century developments in social media, virtual worlds, augmented reality, electronic financial transactions, drones, robotics, and artificial intelligence allow human beings to interact in more and more robust ways at a physical remove from their location. Meanwhile, the ubiquity of multinational corporations, global supply chains, and cloud-based data all mean that our lives are more likely to be affected by activity that is spatially distant. Virtual effects often replace direct territorial effects.

Three important consequences flow from this ubiquitous technology-enabled, data-driven virtual global societal activity. First, the territorial location of data …


The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart Jan 2019

The Department Of Justice Versus Apple Inc. -- The Great Encryption Debate Between Privacy And National Security, Julia P. Eckart

Catholic University Journal of Law and Technology

This article is an attempt to objectively examine and assess legal arguments made by Apple Inc. (Apple) and the Department of Justice (DOJ) concerning the DOJ’s use of the All Writs Act[1] (AWA) to require Apple to provide technical assistance to the DOJ so that it could access the encrypted data from the locked iPhone of Syed Rizwan Farook, commonly referred to as the San Bernardino shooter. The DOJ’s initial ex parte application focused on meeting the requirements of United States v. New York Telephone Co.[2] concluding the court order was authorized and appropriate. Apple not only argued …


Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman Jan 2019

Let’S Get This Show On The Road: Driverless Cars Have Arrived And It’S Time To Advance The Regulatory Framework, Joshua D. Borneman

Catholic University Journal of Law and Technology

The potential benefits that driverless automobile technology will provide to the U.S. and its roadways are vast. Greatly enhanced safety of American citizens is chief among these benefits. Congressional and administrative support will be required if these benefits are to be completely realized by American society. However, lawmakers are dragging their feet on passing legislation that will allow driverless cars to hit the road in full force. This comment examines the legislative proposals put forth by the House of Representatives and Senate. It argues that the differences between the two versions are inconsequential and urges lawmakers to act in order …


From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe Jan 2019

From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe

Catholic University Law Review

In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …


Contents Jan 2018

Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi Jan 2018

Mobile Instant Messaging Evidence In Criminal Trials, Youngjin Choi

Catholic University Journal of Law and Technology

Mobile instant messaging, such as text messages, are a pervasive aspect of everyday life. The characteristics of the modern mobile instant messaging application, especially in comparison with other forms of more traditional electronic communication platforms, such as e-mail, text messaging, or computer-based instant messaging program, present a variety of evidentiary issues in trial.

To be relevant, mobile instant messaging evidence must be connected to a genuine issue at trial and not too attenuated from it. Authentication is also very important in determining whether it may be considered a non-hearsay statement. Although often otherwise admissible, mobile instant messaging evidence may still …


Enforcing Constitutional Rights Through Computer Code, Steve Young Jan 2018

Enforcing Constitutional Rights Through Computer Code, Steve Young

Catholic University Journal of Law and Technology

Lawmaking and enforcement has advanced since Hammurabi first wrote out his legal code thousands of years ago. Today, the American legal system relies on legislatively-enacted federal, state, county, and municipal legal codes, agency-created regulations, the judge-made common law, and various law enforcement entities. This can be a confusing and complex system of rules and their explanations with varying degrees of enforcement. Blockchain technology is an automatic and efficient alternative to written codes that must be humanly-enforced. There has been limited scholarly interest in the implications of a legal application of blockchain technology to a political system but there have been …


Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy Jan 2018

Dating Dangerously: Risks Lurking Within Mobile Dating Apps, Alyssa Murphy

Catholic University Journal of Law and Technology

In modern society, cell phones have become a virtual extension of most Americans. Advances in cell phone technology have given rise to the popularity of mobile dating applications (“apps”), which are capable of allowing users to date and meet potential partners without leaving the comfort of their own homes. The convenience and allure of mobile dating apps has led to a staggering increase in the number of crimes orchestrated against other users of the apps. Such crimes often include solicitation, stalking, murder, and human trafficking. Unsuspecting and trusting users fall victim to these crimes due to the false sense of …


Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie Jan 2018

Say What You Want: How Unfettered Freedom Of Speech On The Internet Creates No Recourse For Those Victimized, Wes Gerrie

Catholic University Journal of Law and Technology

In today’s society, virtually everyone relies on online posts in order to make decisions—from what products to purchase to what restaurants to visit. The introduction and increase of online communication has made posting reviews online a simpler, easier, and more efficient process. However, the increase of online communication has threatened the delicate balance between free speech and harmful speech.

A tangled web of recent case law and federal law exists which aggressively protects the free speech of online reviewers. The law has carved out immunity for the website operators that host an online reviewer’s comments, which in turn makes an …


Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat Jan 2018

Smart Baby Monitors: The Modern Nanny Or A Home Invader, Sarah Ensenat

Catholic University Journal of Law and Technology

Smart baby monitors exist to help parents protect and watch over their children. The smart baby monitors act as a second set of eyes when parents cannot be in the same room as their children. Low-tech hackers take advantage of gaps in the security of smart baby monitors. A hacker violates a consumer’s privacy by gaining access to private information, viewing the home and its occupants, and even speaking to children through the monitor.

This comment advocates for stricter security legislation for smart baby monitors. Without new legislation, manufacturers of smart baby monitors do not apply or invest in the …


Table Of Contents Jan 2018

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall Jan 2018

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …


Masthead Jan 2018

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley Jan 2018

Ng9-1-1, Cybersecurity, And Contributions To The Model Framework For A Secure National Infrastructure, Andrew Jackson Coley

Catholic University Journal of Law and Technology

9-1-1 call networks form the foundation of emergency communications infrastructure. However, a lack of funding and taking such networks for granted has led to a gradual yet predictable outdating of this critical infrastructure. Fortunately, recent efforts have acknowledged as such, and dedicated public safety officials have worked to update 9-1-1 systems to Next Generation 9-1-1 (NG9-1-1).
NG9-1-1 is an IP-based network with 21stcentury technology capable of handling increased call volume, more resilient networks, and providing significantly more data to first responders, among litany of other advancements. With this much needed advancement comes the responsibilities of ensuring a secure …


Assessing Assisted Reproductive Technology, Raymond C. O'Brien Jan 2018

Assessing Assisted Reproductive Technology, Raymond C. O'Brien

Catholic University Journal of Law and Technology

Technological innovation possesses both opportunity and challenge. Because assisted reproductive technology (ART) involves sexual intimacy, parenthood, personhood, gender identity, privacy, legacy, and a plethora of religious, historical, sociological, and ethical underpinnings, the challenges presented in such technological innovation are substantial. Nonetheless, the opportunities are significant and progressive. Because of in vitro fertilization, gestational and genetic surrogacy, posthumous conception, and mitochondrial replacement therapy, humans now have the opportunity to overcome infertility, gender obstacles to parentage, dynastic limitations, and diseases that have long plagued mothers and infants. However, challenges include the exploitation of surrogates, unequal access to ART services, possibilities of cloning …


Privacy Of Information And Dna Testing Kits, Shanna Raye Mason Jan 2018

Privacy Of Information And Dna Testing Kits, Shanna Raye Mason

Catholic University Journal of Law and Technology

In modern times, consumers desire for more control over their own health and healthcare. With this growing interest of control, direct to consumer DNA testing kits have never been more popular. However, many consumers are unaware of the potential privacy concerns associated with such use. This comment examines the popularity and privacy risks that are likely unknown to the individual consumer. This comment also addresses the shortcomings of the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as well as the Genetic Information Nondiscrimination Act of 2008 (GINA) in regard to protecting individual’s genetic information from misuse. This comment …


The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick Jan 2018

The Tortoise And The Hare Of International Data Privacy Law: Can The United States Catch Up To Rising Global Standards?, Matthew Humerick

Catholic University Journal of Law and Technology

Technological developments spur the development of big data on a global scale. The breadth of data companies collect, maintain, process, and transmit affects nearly every country and organization around the world. Inherent to big data are issues of data protection and transfers to third countries. While many jurisdictions emphasize the importance of protecting consumer data, such as the European Union, others, like the United States, do not. To circumvent this issue, the United States and European Union contracted around data privacy standard discrepancies through the Safe Harbor Agreement, which eased cross-border data transfers. However, the Court of Justice of the …


Masthead, Editor In Chief Jan 2018

Masthead, Editor In Chief

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, Editor In Chief Jan 2018

Table Of Contents, Editor In Chief

Catholic University Journal of Law and Technology

No abstract provided.


Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith Jan 2018

Alexa, Who Owns My Pillow Talk? Contracting, Collaterizing, And Monetizing Consumer Privacy Through Voice-Captured Personal Data, Anne Logsdon Smith

Catholic University Journal of Law and Technology

With over one-fourth of households in the U.S. alone now using voice-activated digital assistant devices such as Amazon’s Echo (better known as “Alexa”) and Google’s Home, companies are recording and transmitting record volumes of voice data from the privacy of people’s homes to servers across the globe. These devices capture conversations about everything from online shopping to food preferences to entertainment recommendations to bedtime stories, and even phone and appliance use. With “Big Data” and business analytics expected to be a $203 billion-plus industry by 2020, companies are racing to acquire and leverage consumer data by selling it, licensing it, …


Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard May 2017

Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard

Catholic University Journal of Law and Technology

This note argues that the current framework that governs health care applications and consumer privacy is slacking and outlines strategies to ensure protection against third party accessibility of information that consumers deem private.


Table Of Contents May 2017

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead May 2017

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini May 2017

Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini

Catholic University Journal of Law and Technology

No abstract provided.


#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu May 2017

#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu

Catholic University Journal of Law and Technology

No abstract provided.