Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Surveillance (5)
- Bitcoin (4)
- Blockchain (4)
- NFT (4)
- AI (3)
-
- Artificial intelligence (3)
- Big data (3)
- Copyright (3)
- Fourth Amendment (3)
- Algorithm (2)
- Biometrics (2)
- Copyright/Computer software (2)
- Cryptocurrency (2)
- Digital currency (2)
- Fair use (2)
- Federal Trade Commission (2)
- Federal law (2)
- Hack (2)
- Hacking (2)
- Identity theft (2)
- Online (2)
- Personal data (2)
- Personal jurisdiction (2)
- Privacy (2)
- Property (2)
- Purchase (2)
- Quantum computing (2)
- Technology (2)
- Token (2)
- Trademark (2)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 47
Full-Text Articles in Law
Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle
Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle
Washington and Lee Law Review Online
In an era dominated by efficiency-driven technology, algorithms have seamlessly integrated into every facet of daily life, wielding significant influence over decisions that impact individuals and society at large. Algorithms are deliberately portrayed as impartial and automated in order to maintain their legitimacy. However, this illusion crumbles under scrutiny, revealing the inherent biases and discriminatory tendencies embedded in ostensibly unbiased algorithms. This Note delves into the pervasive issues of discriminatory algorithms, focusing on three key areas of life opportunities: housing, employment, and voting rights. This Note systematically addresses the multifaceted issues arising from discriminatory algorithms, showcasing real-world instances of algorithmic …
Artificial Intelligence And Transformative Use After Warhol, Gary Myers
Artificial Intelligence And Transformative Use After Warhol, Gary Myers
Washington and Lee Law Review Online
The Supreme Court’s recent decision in Andy Warhol Foundation for the Visual Arts, Inc. v. Goldsmith clarifies the scope of transformative use and the role of these uses in the fair use analysis. This important case has implications for a fair use analysis of artificial intelligence. This article evaluates the interaction between copyright law’s fair use doctrine and typical sources and uses for artificial intelligence. In other words, the article will assess whether or not the use of copyrighted material to “train” AI programs—AI inputs—and the products of AI programs—AI outputs—are likely to found to be transformative in light of …
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver
Washington and Lee Journal of Civil Rights and Social Justice
After the fall of Roe v. Wade, states across the country have enacted extreme abortion bans. Anti-abortion states, emboldened by their new, unrestricted power to regulate women’s bodies, are only broadening the scope of abortion prosecutions. And modern technology provides law enforcement with unprecedented access to women’s most intimate information, including, for example, their menstrual cycle, weight, body temperature, sexual activity, mood, medications, and pregnancy details. Fourth Amendment law fails to protect this sensitive information stored on femtech apps from government searches. In a largely unregulated private market, femtech apps sell health and location data to third parties like Fog …
Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai
Mitigating The Legal Challenges Associated With Blockchain Smart Contracts: The Potential Of Hybrid On-Chain/Off-Chain Contracts, Niloufer Selvadurai
Washington and Lee Law Review
Tantamount with the increasing application of blockchain technologies around the world, the use of blockchain-based smart contracts has rapidly risen. In a “smart contract,” computer protocols automatically facilitate, verify, and enforce arrangements made between parties on a blockchain. Such smart contracts offer a variety of commercial benefits, notably immutability and increased efficiency facilitated by removing the need for a trusted intermediary. However, as discussed in recent legal scholarship, it is difficult for smart contracts to uphold certain fundamental principles of contract law. Translating concepts of individual intention and responsibility into the decentralized space of blockchain is problematic. Aggregating such individual …
Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim
Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim
Washington and Lee Law Review
FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …
The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire
The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire
Washington and Lee Law Review
Global connectivity is at an all-time high, and sovereign state law has not fully caught up with the technological innovations enabling that connectivity. TCP/IP—the communications protocol allowing computers on different networks to speak with each other—wasn’t adopted by ARPANET and the Defense Data Network until January 1983. That’s only forty years ago. And the World Wide Web wasn’t released to the general public until August 1991, less than thirty-five years ago. The first Bitcoin block was mined on January 3, 2009, less than fifteen years ago.
Legal doctrine doesn’t develop that fast, especially in legal systems heavily based around judicial …
Keynote Address, Sultan Meghji
Keynote Address, Sultan Meghji
Washington and Lee Law Review
Keynote address presented virtually at the Washington and Lee Law Review's 54th Annual Lara D. Gass Symposium: The Future of E-Commerce: Is It on a Blockchain? on Friday, March 17, 2023 in Lexington, Virginia.
Digital Property Cycles, Joshua Fairfield
Digital Property Cycles, Joshua Fairfield
Washington and Lee Law Review
The present downturn in non-fungible token (“NFT”) markets is no cause for immediate alarm. There have been multiple cycles in both the legal and media focus on digital intangible property, and these cycles will recur. The cycles are easily explainable: demand for intangible property is constant, even increasing. The legal regimes governing ownership of these assets are unstable and poorly suited to satisfying the preferences of buyers and sellers. The combination of demand and poor legal regulation gives rise to the climate of fraud that has come to characterize NFTs, but it has nothing to do with the value of …
How The Blockchain Undermined Digital Ownership, Aaron Perzanowski
How The Blockchain Undermined Digital Ownership, Aaron Perzanowski
Washington and Lee Law Review
The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …
The Perks Of Being Human, Max Stul Oppenheimer
The Perks Of Being Human, Max Stul Oppenheimer
Washington and Lee Law Review Online
The power of artificial intelligence has recently entered the public consciousness, prompting debates over numerous legal issues raised by use of the tool. Among the questions that need to be resolved is whether to grant intellectual property rights to copyrightable works or patentable inventions created by a machine, where there is no human intervention sufficient to grant those rights to the human. Both the U. S. Copyright Office and the U. S. Patent and Trademark Office have taken the position that in cases where there is no human author or inventor, there is no right to copyright or patent protection. …
Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency
Do Not Touch My Data: Exploring A Disclosure-Based Framework To Address Data Access, Francis Morency
Washington and Lee Journal of Civil Rights and Social Justice
Companies have too much control over people’s information. In the data marketplace, companies package and sell individuals’ data, and these individuals have little to no bargaining power over the process. Companies may freely buy and sell people’s data in the private sector for targeted marketing and behavior manipulation. In the justice system, an unchecked data marketplace leaves black and brown communities vulnerable to serious data access issues caused by predictive sentencing, for example. Risk assessment algorithms in predictive sentencing rely on data on individuals and run all relevant data points to provide the likelihood that a defendant will recidivate low …
Making Virtual Things, Joshua A.T. Fairfield
Making Virtual Things, Joshua A.T. Fairfield
Scholarly Articles
People value virtual things—such as NFTs—because such assets trigger and satisfy deep-seated narratives of property and ownership. The cause of the recent series of failures to regulate virtual assets, and the resulting crashes, has been a failure to take seriously the ways people perceive and use the assets. Current legal frameworks fail to support buyers’ and users’ expectations of ownership in virtual things they purchase.
Making virtual things is a matter of social construction of value. Virtual things, like real-world things, have value because a community values them for a purpose. It therefore makes no sense to discount how and …
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Creativity Without Ip? Vindication And Challenges In The Video Game Industry, Bj Ard
Creativity Without Ip? Vindication And Challenges In The Video Game Industry, Bj Ard
Washington and Lee Law Review
This Article intervenes in the longstanding debate over whether creative production is possible without exhaustive copyright protection. Intellectual property (IP) scholars have identified “negative spaces” like comedy and tattoo art where creativity thrives without IP, but critics dismiss these examples as niche. The video game industry allows for fresh headway. It is now the largest sector in entertainment—with revenues greater than Hollywood, streaming, and music combined—yet IP does not protect key game elements from duplication. Participants navigate this absence using non-IP strategies like those identified in negative-space industries: AAA developers invest in copy-resistant features while indie game developers rely on …
The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes
The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes
Washington and Lee Law Review
Criticism of the Chinese Communist Party (CCP) runs a wide gamut. Accusations of human rights abuses, intellectual property theft, authoritarian domestic policies, disrespecting sovereign borders, and propaganda campaigns all have one common factor: the CCP’s desire to control information. Controlling information means controlling data. Lurking beneath the People’s Republic of China’s (PRC) tumultuous relationship with the rest of the world is the fight between nations to control their citizens’ data while also keeping it out of the hands of adversaries. The CCP’s Three Laws are its newest weapon in this data war.
One byproduct of the CCP’s emphasis on controlling …
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Scholarly Articles
Much of the confusion about the proper regulation of smart contracts stems from the fact that both code and law are expressed in language. Natural (human) and formal (computer) languages are profoundly different, however. Natural language in the form of a true legal contract expresses human meaning and expectation. Code simply acts, and when code acts contrary to the understanding of the parties to a contract, courts must have a theoretical and legal basis in order to intervene--which this Article provides.
Present scholarship on the governance of smart contracts centers on logistical problems relating to the effects of automation on …
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Scholarly Articles
Markets for unique digital property--digital equivalents of rare artworks, collectible trading cards, and other assets that gain value from scarcity--have exploded in the past few years. At root is the next iteration of blockchain technology, unique digital assets called non-fungible tokens. Unlike bitcoin, where one coin is the same as another, NFTs are unique, each with different attributes. An NFT that represented ownership of Boardwalk would be quite different from one that represented Baltic Avenue.
NFTs have grown from a few early breakout successes to a rapidly developing market for unique digital treasures. The attraction to buyers is that, unlike …
Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty
Comment: The Necessary Evolution Of State Data Breach Notification Laws: Keeping Pace With New Cyber Threats, Quantum Decryption, And The Rapid Expansion Of Technology, Beth Burgin Waller, Elaine Mccafferty
Washington and Lee Law Review
The legal framework that was built almost two decades ago now struggles to keep pace with the rapid expansion of technology, including quantum computing and artificial intelligence, and an ever-evolving cyber threat landscape. In 2002, California passed the first data breach notification law, with all fifty states following suit to require notice of unauthorized access to and acquisition of an individual’s personal information.1 These data breach notification laws, originally designed to capture one-off unauthorized views of data in a computerized database, were not built to address PowerShell scripts by cyber terrorists run across thousands of servers, leaving automated accessed data …
Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon
Data Breach Notification Laws And The Quantum Decryption Problem, Phillip Harmon
Washington and Lee Law Review
In the United States, state data breach notification laws protect citizens by forcing businesses to notify those citizens when their personal information has been compromised. These laws almost universally include an exception for encrypted personal data. Modern encryption methods make encrypted data largely useless, and the notification laws aim to encourage good encryption practices.
This Note challenges the wisdom of laws that place blind faith in the continued infallibility of encryption. For decades, Shor’s algorithm has promised polynomial-time factoring once a sufficiently powerful quantum computer can be built. Competing laboratories around the world steadily continue to march toward this end. …
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Keeping The Zombies At Bay: Fourth Amendment Problems In The Fight Against Botnets, Danielle Potter
Washington and Lee Journal of Civil Rights and Social Justice
You may not have heard of a botnet. If you have, you may have linked it to election shenanigans and nothing else. But if you are reading this on a computer or smartphone, there is a good chance you are in contact with a botnet right now.
Botnets, sometimes called “Zombie Armies,” are networks of devices linked by a computer virus and controlled by cybercriminals. Botnets operate on everyday devices owned by millions of Americans, and thus pose a substantial threat to individual device owners as well as the nation’s institutions and economy.
Accordingly, the United States government has been …
The Digital Samaritans, Eldar Haber
The Digital Samaritans, Eldar Haber
Washington and Lee Law Review
Bystanderism is becoming largely digital. If being subjected to perilous situations was once reserved almost solely for the physical world, individuals now might witness those in peril digitally from afar via online livestreams. New technological developments in the field of artificial intelligence (AI) might also expand bystanderism to new fields, whereby machines—not just humans—are gradually positioned to better compute their surroundings, thus potentially being capable of reaching a high statistical probability that a perilous situation is currently taking place in their vicinity. This current and future expansion of bystanderism into the digital world forms a rather new type of digital …
Taxation Of Electronic Gaming, Bryan T. Camp
Taxation Of Electronic Gaming, Bryan T. Camp
Washington and Lee Law Review
At a doctrinal level, the subject of this Article is timely. During this time of the coronavirus pandemic, casinos have been closed and large populations have been subject to stay-home orders from local and state authorities. One can reasonably expect a large increase in electronic gaming and thus an increased need for proper consideration of its taxation. This Article argues for a cash-out rule of taxation.
At a deeper level, the subject of this Article is timeless. Tax law is wickedly complex for a reason. This Article explores that complexity using the example of electronic gaming. It grapples with the …
Secret Conviction Programs, Meghan J. Ryan
Secret Conviction Programs, Meghan J. Ryan
Washington and Lee Law Review
Judges and juries across the country are convicting criminal defendants based on secret evidence. Although defendants have sought access to the details of this evidence—the results of computer programs and their underlying algorithms and source codes—judges have generally denied their requests. Instead, judges have prioritized the business interests of the for-profit companies that developed these “conviction programs” and which could lose market share if the secret algorithms and source codes on which the programs are based were exposed. This decision has jeopardized criminal defendants’ constitutional rights.
Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek
Reinvesting In Rico With Cryptocurrencies: Using Cryptocurrency Networks To Prove Rico’S Enterprise Requirement, Andrew Robert Klimek
Washington and Lee Law Review
This Note received the 2019 Roy L. Steinheimer Law Review Award.
This Note argues that the Racketeer Influenced and Corrupt Organizations Act (RICO) may be suited to cryptocurrency prosecutions. RICO subsection 1962(a) addresses the infiltration of an enterprise by investing proceeds from racketeering activities and this Note contends that a cryptocurrency network could serve as the “enterprise” required by the statute. Instead of having to investigate and prove the relationships in an underlying criminal enterprise, proponents of a RICO case against crypto-criminals could rely on well-documented and publicly available information about the cryptocurrency network to prove the enterprise and the …
Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick
Reaching Through The “Ghost Doxer:” An Argument For Imposing Secondary Liability On Online Intermediaries, Natalia Homchick
Washington and Lee Law Review
Imagine you have decided to run for office, to speak out publicly against an injustice, to enter the job market, or even to join a new online forum. Now, imagine after starting your chosen endeavor, you go online to discover that someone who disagrees with your position posted your personal information on the internet and called for others to harass you. To make matters worse, you realize that you cannot determine who posted your personal data. You have been doxed. Because you cannot identify the person who posted your information, where can you turn for recourse? The next logical party …
A Commercial Law For Software Contracting, Michael L. Rustad, Elif Kavusturan
A Commercial Law For Software Contracting, Michael L. Rustad, Elif Kavusturan
Washington and Lee Law Review
Since the 1980s, software is at the core of most modern organizations, most products and most services. Part II of this Article examines how the U.C.C. evolved as the primary source of law for the first generation of computer contracts during the mainframe computer era. Part III examines how courts have overextended U.C.C. Article 2, as the main source of law for software licensing, to the limits. Part IV argues that the ALI and the NCCUSL should propose a new Article 2B for software licensing. Part V recommends a new Article 2C for “software as a service.”
Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden
Text Messages Are Property: Why You Don’T Own Your Text Messages, But It’D Be A Lot Cooler If You Did, Spence M. Howden
Washington and Lee Law Review
This Note proceeds as follows: Part II offers a brief overview of what text messages are and what they are not. Part III covers the history of intangible personal property law and reviews the evolution of “cybertrespass” claims. Part IV explores the judiciary and the Fourth Amendment’s failure to protect text messages. Finally, Part V evaluates whether text messages constitute property and the practical implications of this finding.
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes
Washington and Lee Journal of Civil Rights and Social Justice
High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet while these hackers make astronomical payoffs, the …
The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield
The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield
Scholarly Articles
This Article constitutes a lightly edited transcription of Joshua Fairfield's oral remarks at the April 6, 2018 Cleveland State Law Review Symposium on Blockchain Law and Technology.
The author posits that there is a tendency to think that technology will emerge triumphant in resolving physical problems, including banking and transactional recording; that there is sort of a "tech-bro utopianism," epitomized by Mark Zuckerberg, suggesting that what we need is a technological, not a human, solution. He states that one major problem is that social technologists, psychologists, historians, linguists, and cultural anthropologists are not on the development teams that are building …
The Legal Fate Of Internet Ad-Blocking, Russell A. Miller
The Legal Fate Of Internet Ad-Blocking, Russell A. Miller
Scholarly Articles
Ad-blocking services allow individual users to avoid the obtrusive advertising that both clutters and finances most Internet publishing. Ad-blocking's immense - and growing - popularity suggests the depth of Internet users' frustration with Internet advertising. But its potential to disrupt publishers' traditional Internet revenue model makes ad-blocking one of the most significant recent Internet phenomena. Unsurprisingly, publishers are not inclined to accept ad-blocking without a legal fight. While publishers are threatening suits in the United States, the issues presented by ad-blocking have been extensively litigated in German courts where ad-blocking consistently has triumphed over claims that it represents a form …