Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

Data

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 160

Full-Text Articles in Law

Digital Allotment And Vanishing Indians: Idsov And Llms, Sam Mcveety May 2024

Digital Allotment And Vanishing Indians: Idsov And Llms, Sam Mcveety

American Indian Law Journal

No abstract provided.


The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba Apr 2024

The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba

Northwestern University Law Review

Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.

This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …


Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick Jan 2024

Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick

Georgia Law Review

There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …


Comment: Court Adr Analytics, Benjamin G. Davis Jan 2024

Comment: Court Adr Analytics, Benjamin G. Davis

Washington and Lee Law Review

For the reasons in my comments below, Jordan Hicks’s note entitled Judicial-ish Efficiency: An Analysis of Alternative Dispute Resolution Programs in Delaware Superior Court is a tour de force. Its content and methodology suggest a fresh approach to thinking about court-annexed Alternative Dispute Resolution (“ADR”) in general and court-annexed mandatory nonbinding arbitration programs in particular. The meticulous analysis of three different eras (1978–2008, 2008–2018, and 2018–present) of the program, with a focus on judicial efficiency (speed, failure rate, and prejudicial concerns), provides an important template for how this work might be expanded to look at programs in other courts …


Healthcare Reparations In California, Chelsea J. Gaudet Nov 2023

Healthcare Reparations In California, Chelsea J. Gaudet

San Diego Law Review

The Reparations Task Force has recommended several key areas in which the state of California can offer reparations for its systemic abuse of African Americans. The Interim Report issued by the Task Force highlights the discrepancy in health outcomes for White Californians versus Black Californians and attributes the difference not just to inequitable access, but also to a special compounding effect of physical and mental stress suffered solely by Black Californians as a result of systemic and personal environmental racial discrimination.

This Essay discusses the unique aspects of “weathering” and the insidious effect of racial bias in research meant to …


The Applications Docket, Greg Goelzhauser Nov 2023

The Applications Docket, Greg Goelzhauser

Georgia Law Review

The Supreme Court’s applications docket, often misleadingly called the “shadow docket” or “emergency docket,” is controversial, complex, and poorly understood. Using original data spanning nearly two decades, I unravel the docket’s empirical foundations. Applications practice changed fundamentally in recent years. Contrary to conventional wisdom, dispositions declined on average, but this conceals divergent trends: among applications involving stays and injunctions, capital dispositions decreased while noncapital dispositions increased. Moreover, noncapital applications now comprise a larger share of the docket than capital applications. This shift enhances docket salience because, as I show, most capital applications are denied simultaneous to denying plenary review, while …


The Digital Person: Law Enforcement & The Purchase Of Data In A Post Carpenter Age, Jay E. Town Nov 2023

The Digital Person: Law Enforcement & The Purchase Of Data In A Post Carpenter Age, Jay E. Town

Belmont Law Review

It once was reasonable to expect courts to rule that there is no reasonable expectation of privacy, even in the digital era, because nearly all of the information streamed from mobile devices, applications, and browsers is voluntarily shared per the terms of the platforms', websites', and applications' agreements. But then the United States Supreme Court issued its opinion in Carpenter v. United States. Scholars and jurists alike opined, to some degree of hyperbole, on the enormity of the impact this holding would have on the Fourth Amendment going forward. Defense counsel and privacy advocates regaled the case as a …


Security In The Digital Age, Michael Gentithes Oct 2023

Security In The Digital Age, Michael Gentithes

Akron Law Review

Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …


“Statistics Are Human Beings With The Tears Wiped Away”: Utilizing Data To Develop Strategies To Reduce The Number Of Native Americans Who Go Missing, Lori Mcpherson, Sarah Blazucki Jan 2023

“Statistics Are Human Beings With The Tears Wiped Away”: Utilizing Data To Develop Strategies To Reduce The Number Of Native Americans Who Go Missing, Lori Mcpherson, Sarah Blazucki

Seattle University Law Review

On New Year’s Eve night, 2019, sixteen-year-old Selena Shelley Faye Not Afraid attended a party in Billings, Montana, about fifty miles west of her home in Hardin, Montana, near the Crow Reservation. A junior at the local high school, she was active in her community. The party carried over until the next day, and she caught a ride back toward home with friends in a van the following afternoon. When the van stopped at an interstate rest stop, Selena got out but never made it back to the van. The friends reported her missing to the police and indicated they …


The Central Monitoring System And Privacy: Analysing What We Know So Far, Jaideep Reddy Sep 2022

The Central Monitoring System And Privacy: Analysing What We Know So Far, Jaideep Reddy

Indian Journal of Law and Technology

State-run surveillance is as old as the ages, but the wired state of our lives has put it in the spotlight more now than perhaps ever before. Our communication and data can often be veritable repositories of all that we are, and many governments today have the technological means to give them relatively easy access to most of our private data. Civil society around the world has therefore naturally expressed concern over the increasing scope of State surveillance. The Central Monitoring System (hereafter, “CMS”) is a new technology for State surveillance in India, and is in the nascent stages of …


Tennessee Revenge Porn Law: Prosecutorial Problems And Potential Solutions, Doni Porteous May 2022

Tennessee Revenge Porn Law: Prosecutorial Problems And Potential Solutions, Doni Porteous

Lincoln Memorial University Law Review Archive

No abstract provided.


Rage Against The Machine: Reducing Robocall Abuse To Protect At-Risk Consumers, Nicole Egan May 2022

Rage Against The Machine: Reducing Robocall Abuse To Protect At-Risk Consumers, Nicole Egan

University of Massachusetts Law Review

For most people, robocalls are nothing more than an annoying side-effect of owning a cell phone today. But a successful robocall scheme is still capable of wreaking financial and psychological havoc on its victims. Senior citizens and cognitively impaired individuals are often targeted by fraudulent phone calls or texts because they may have trouble understanding how to identify and protect themselves from robocall abuse. This Note proposes a collaborative solution to this problem by calling on the judiciary and legislatures to minimize the amount of robocalls received by American telephone consumers. By adopting a broader understanding of the law and …


Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare, Humna Sohail Mar 2022

Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare, Humna Sohail

Journal of Digital Forensics, Security and Law

The dynamics of warfare have changed from the conventional wars fought on the battlefield to virtual warfare as states have been involved in the cyber arms race. From simple distributed denial-of-service (DDoS) attacks to the potent Stuxnet and Flame the cyber weapons vary in their potential human cost. The Law of Armed Conflict (LOAC) is drafted flexibly to adapt to changing circumstances. This paper is primarily based upon the assumption that existing treaty law is sufficient in many aspects yet in some areas treaty-making is also needed. What is the foreseeable solution is the comprehensive state practice for interpreting the …


A Silver Bullet: Could Data Linking Urban Heat Islands To Housing Discrimination Curtail Environmental Racism?, Russell Armstrong Mar 2022

A Silver Bullet: Could Data Linking Urban Heat Islands To Housing Discrimination Curtail Environmental Racism?, Russell Armstrong

Sustainable Development Law & Policy

“[A]ll things share the same breath— the beast, the tree, the man …the air shares its spirit with all the life it supports.”

Google “Chief Seattle” and you will likely find that quote. We now know it is a work of fiction after several misinterpretations and fabrications of Dr. Henry Smith’s original translation. We also know now that all people, particularly Black Americans, do not all breathe the same air. Instead, Black Americans and other underrepresented minorities are subjected to the toxic effects of climate change at increasingly disproportionate rates. Controlling for income, studies find racial identity is the most …


Masalah Penggunaan Ciptaan Sebagai Data Masukan Dalam Pengembangan Artificial Intelligence Di Indonesia, Ari Juliano Gema Feb 2022

Masalah Penggunaan Ciptaan Sebagai Data Masukan Dalam Pengembangan Artificial Intelligence Di Indonesia, Ari Juliano Gema

Technology and Economics Law Journal

The development of Artificial Intelligence (AI) is growing so fast. The availability of input data is important because it has a major impact on how the AI system will be developed. The use of copyrighted works as input data in AI development is also unavoidable. This paper tries to examine how the copyright law in Indonesia relates to the use of copyrighted works as input data for AI development. Based on the results of the study, it is known that the use of copyrighted works as input data for AI development in Indonesia still has to respect the exclusive rights …


Dataset And Codebook For Jamovi Tutorials, Saera R. Khan Jan 2022

Dataset And Codebook For Jamovi Tutorials, Saera R. Khan

Journal of Interdisciplinary Perspectives and Scholarship

No abstract provided.


Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski Jan 2022

Passcodes, Protection, And Legal Practicality: The Necessity Of A Digital Fifth Amendment, Ethan Swierczewski

Catholic University Journal of Law and Technology

No abstract provided.


Illusory Privacy, Thomas Haley Jan 2022

Illusory Privacy, Thomas Haley

Indiana Law Journal

For decades, regulators, consumer advocates, and privacy theorists have grappled with one of privacy’s most important questions: how to protect private information that consumers unwittingly give away with the click of an “I accept” button. Reform efforts remain mired in a morass of text, focusing on the increasing volume and complexity of firms’ terms of service and privacy policies. This Article moves beyond such existing approaches. By analyzing terms of service and privacy policies from hundreds of top websites—which this Article calls “platform terms”—this Article demonstrates that the prevailing “notice and consent” paradigm of privacy regulation cannot provide meaningful protection. …


International Application Of Cfaa: Scraping Data Or Scraping Law?, King Fung Tsang Jan 2022

International Application Of Cfaa: Scraping Data Or Scraping Law?, King Fung Tsang

Saint Louis University Law Journal

Web scraping has resulted in a growing number of civil litigations internationally, including claims under the Computer Fraud and Abuse Act (“CFAA”) in the United States. With the Supreme Court’s first ever decision on the CFAA, in Van Buren v. United States, and its granting of LinkedIn’s petition for certiorari in June 2021, the CFAA is expected to attract even more interest among scholars and practitioners. However, little attention has been given to its cross-border ramifications. Cases show that U.S. courts are more than willing to apply the CFAA extraterritorially, even though their analyses are often flawed. In addition, …


Vaccine Clinical Trials And Data Infrastructure, Ana Santos Rutschman Nov 2021

Vaccine Clinical Trials And Data Infrastructure, Ana Santos Rutschman

Utah Law Review

We find ourselves at a momentous turn in the history of vaccines. The COVID-19 pandemic triggered a quasi-global vaccine race that not only compressed vaccine research and development (R&D) timelines, but also paved the way for the administration of a new type of vaccine technology – mRNA vaccines, which work in substantially different ways from the vaccines in use before the pandemic.

While the process of bringing emerging COVID-19 vaccines to market has taken place in an unusually short timeframe, it was largely predicated on the same scientific and regulatory processes that govern the development, approval and deployment of new …


Monopolizing Sports Data, Marc Edelman, John T. Holden Oct 2021

Monopolizing Sports Data, Marc Edelman, John T. Holden

William & Mary Law Review

With legal sports betting viewed as a panacea for state budget woes across the United States, the underlying data that fuels the sports betting industry has emerged as an especially valuable asset. In the hopes of capitalizing on state laws that have now legalized sports betting, United States professional sports leagues have attempted to gain exclusive ownership rights over valuable sports betting data by asking legislators to mandate that bookmakers exclusively use data sold through the league. In addition, some sports leagues have imposed policies mandating that teams bundle together their collected data for purposes of selling it exclusively through …


Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi Jun 2021

Biometric Data Regulation And The Right Of Publicity: A Path To Regaining Autonomy Over Our Commodified Identity, Lisa Raimondi

University of Massachusetts Law Review

This Note explores how a right of publicity action might be used to address present day concerns regarding biometric data ownership rights where an individual’s likeness can essentially be bought and sold. As social networking and use of the internet has grown, so has the opportunity for people to engage with others and share their lives. However, that opportunity also comes with risk. More and more, people are required to accept the terms of use and privacy policies detailing how their biometric data will be collected and stored if they want to download and use certain technological applications. Most of …


Cartoon Contracts And The Proactive Visualization Of Law, Michael D. Murray Jun 2021

Cartoon Contracts And The Proactive Visualization Of Law, Michael D. Murray

University of Massachusetts Law Review

Contracts have always relied on text first, foremost, and usually exclusively. Yet, this approach leaves many users of contracts in the dark as to the actual meaning of the transactional documents and instruments they enter into. The average contract routinely uses language that only lawyers, law-trained readers, and highly literate persons can truly understand. There is a movement in the law in the United States and many other nations called the visualization of law movement that attempts to bridge these gaps in contractual communication by using highly visual instruments. In appropriate circumstances, even cartoons and comic book forms of sequential …


The Federal Rule Of Civil Procedure 37(E) And Achieving Uniformity Of Case Law On Sanctions For Esi Spoliation: Focusing On The “Intent To Deprive” Culpability Under Rule 37(E)(2), Jung Won Jun, Rockyoun Ihm Apr 2021

The Federal Rule Of Civil Procedure 37(E) And Achieving Uniformity Of Case Law On Sanctions For Esi Spoliation: Focusing On The “Intent To Deprive” Culpability Under Rule 37(E)(2), Jung Won Jun, Rockyoun Ihm

Catholic University Law Review

Federal Rule of Civil Procedure 37(e) was adopted in 2015 primarily to resolve the circuit split and promote uniformity of case law on ESI (electronically stored information) spoliation sanctions. This Article examines relevant case law under the new Rule 37(e) and finds that courts have treated similar spoliation conduct differently due to the lack of a clear standard for finding the spoliator's intent to deprive another party of the use of the destroyed ESI at issue. This inconsistency has been exacerbated by the courts’ inconsistent reliance on their inherent authority to sanction based on bad faith analyses. Therefore, this Article …


Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas Apr 2021

Taking It With You: Platform Barriers To Entry And The Limits Of Data Portability, Gabriel Nicholas

Michigan Technology Law Review

Policymakers are faced with a vexing problem: how to increase competition in a tech sector dominated by a few giants. One answer proposed and adopted by regulators in the United States and abroad is to require large platforms to allow consumers to move their data from one platform to another, an approach known as data portability. Facebook, Google, Apple, and other major tech companies have enthusiastically supported data portability through their own technical and political initiatives. Today, data portability has taken hold as one of the go-to solutions to address the tech industry’s competition concerns.

This Article argues that despite …


Natural Language Processing For Lawyers And Judges, Frank Fagan Apr 2021

Natural Language Processing For Lawyers And Judges, Frank Fagan

Michigan Law Review

A Review of Law as Data: Computation, Text, & the Future of Legal Analysis. Edited by Michael A. Livermore and Daniel N. Rockmore.


Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango Mar 2021

Cloudy With A Chance Of Government Intrusion: The Third-Party Doctrine In The 21st Century, Steven Arango

Catholic University Law Review

Technology may be created by humans, but we are dependent on it. Look around you: what technology is near you as you read this abstract? An iPhone? A laptop? Perhaps even an Amazon Echo. What do all these devices have in common? They store data in the cloud. And this data can contain some of our most sensitive information, such as business records or medical documents.

Even if you manage this cloud storage account, the government may be able to search your data without a warrant. Federal law provides little protection for cloud stored data. And the Fourth Amendment may …


Georgia’S Approach To Proportionality And Sanctions For The Spoliation Of Electronically Stored Information, Matthew Daigle Mar 2021

Georgia’S Approach To Proportionality And Sanctions For The Spoliation Of Electronically Stored Information, Matthew Daigle

Georgia State University Law Review

The rapid evolution and implementation of technology in society has resulted in the increasing use of data as evidence in court. While the scope of discovery is limited by, among other things, the burden imposed on the producing party, the sheer magnitude of electronic evidence compared to its physical counterpart necessitates a different framework for evaluating such a burden. Without limiting factors, the discoverability of electronically stored information (ESI) exposes producing parties to liability disproportionate to the value of a case. While the Federal Rules of Civil Procedure have evolved to address the discovery of ESI, the Georgia Civil Practice …


Examining Sociodemographic Data Reporting Requirements In State Disease Surveillance Systems, Samantha Bent Weber, Amanda Moreland, Rachel Hulkower, Tara Ramanathan Holiday Jan 2021

Examining Sociodemographic Data Reporting Requirements In State Disease Surveillance Systems, Samantha Bent Weber, Amanda Moreland, Rachel Hulkower, Tara Ramanathan Holiday

Saint Louis University Journal of Health Law & Policy

Law plays an important role in the collection of data related to disease and injury in a population. A robust system of laws sets out requirements for the collection, analysis, and dissemination of disease reporting data from local, state, territorial, and federal public health institutions. Occurrence of disease, including outbreaks of novel infectious agents like coronaviruses, influenza viruses, and others that have arisen in recent years, often require epidemiologists and others to understand not only the etiology and specific context of diseases and conditions, but also the trajectory of their spread among and across communities. Capturing sociodemographic data is critical …


Shifting Contour Of Data Sharing In Financial Market And Regulatory Responses: The Uk And Australian Models, Han-Wei Liu Jan 2021

Shifting Contour Of Data Sharing In Financial Market And Regulatory Responses: The Uk And Australian Models, Han-Wei Liu

American University Business Law Review

I. INTRODUCTION

Starting from Directive 2015/2366 on Payment Services in the Internal Market — known as PSD II in the European Union (EU) — countries across the world have or are contemplating a new framework to govern data sharing among different players in the financial market. “Open Banking,” as this trend is called, requires or encourages — depending on the regulatory models adopted in different jurisdictions — banks to share consumer-permissioned banking data with third parties securely, in a form that facilitates its use. The Open Banking initiatives have diffused from the EU, and the UK, to elsewhere. The current …