Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (15)
- Technology (14)
- Copyright (8)
- Privacy (8)
- Communications Law (5)
-
- Intellectual Property Law (5)
- Patent (5)
- First Amendment (4)
- IP (4)
- Science (4)
- Age (3)
- Information Privacy (3)
- Intellectual property (3)
- Jurisdiction (3)
- Social Media (3)
- Social media (3)
- Comparative Law (2)
- Computer (2)
- Computer Law (2)
- Crimes (2)
- Cybersecurity (2)
- Data (2)
- Domain names (2)
- Evidence (2)
- Freedom of Speech (2)
- International law (2)
- Internet of things (2)
- Law (2)
- Liability (2)
- Regulation (2)
- Publication Year
Articles 1 - 30 of 52
Full-Text Articles in Law
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
Opaque Notification: A Country-By-Country Review, Lauren Mantel
Opaque Notification: A Country-By-Country Review, Lauren Mantel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series
The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll
Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
This Essay turns questions about artificial intelligence and copyright law around. Rather than focus on algorithms as potential authors, this Essay argues for more attention to the role of algorithms as gatekeepers on social media and how creators adapt their creative choices to meet the demands of these automated tastemakers. Using TikTok’s “For You” algorithm and its role in breaking Lil Nas X’s hit song “Old Town Road” as a case study, this Essay poses the question whether algorithmic gatekeeping is simply a difference in degree or a difference in kind from an artist’s perspective. While tentative, this Essay concludes …
Game Theory Optimized Fraud: How The Unlawful Internet Gambling Enforcement Act Created A Virtually Riskless Environment For White Collar Crime In Online Poker, Jeffrey Woolf
Upper Level Writing Requirement Research Papers
No abstract provided.
Protecting Children In The Age Of End-To-End Encryption, Laura Draper
Protecting Children In The Age Of End-To-End Encryption, Laura Draper
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman
Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Regulating The Digital Resonance, Hassan Salman
Regulating The Digital Resonance, Hassan Salman
Upper Level Writing Requirement Research Papers
No abstract provided.
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan
Articles in Law Reviews & Other Academic Journals
The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …
“Hey Siri, I’M Being Pulled Over.”, Charlene Collazo Goldfield, Gabriela Chambi, Amanda Torres
“Hey Siri, I’M Being Pulled Over.”, Charlene Collazo Goldfield, Gabriela Chambi, Amanda Torres
Joint PIJIP/TLS Research Paper Series
Statistics show that policing disproportionately affects communities of color; police are more likely to use force against Black and brown people.1 Data from non-violent encounters (e.g., reason for the stop, type of force used, and presence of witnesses) is rarely collected or disregarded altogether.2 Video evidence can publicize police violence. Bystander video during George Floyd’s murder led to arrests and a global racial reckoning because it depicted the reality of police encounters for people of color. Although technological advancements have led to positive developments for civilian safety (e.g., body cameras and in-car videos), data collection consistency and accountability …
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Who's Afraid Of Section 1498? A Case For Government Patent Use In Pandemics And Other National Crisis, Charles Duan, Christopher J. Morten
Who's Afraid Of Section 1498? A Case For Government Patent Use In Pandemics And Other National Crisis, Charles Duan, Christopher J. Morten
Articles in Law Reviews & Other Academic Journals
COVID-19 has created pressing and widespread needs for vaccines, medical treatments, PPE, and other medical technologies, needs that may conflict--indeed, have already begun to conflict--with the exclusive rights conferred by United States patents. The U.S. government has a legal mechanism to overcome this conflict: government use of patented technologies at the cost of government paid compensation under 28 U. S.C. § 1498. But while many have recognized the theoretical possibility of government patent use under that statute, there is today conventional wisdom that § 1498 is too exceptional, unpredictable, and dramatic for practical use, to the point that it ought …
Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman
Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman
Joint PIJIP/TLS Research Paper Series
The Covid-19 pandemic has illustrated the importance of accurate, real-time information and empirical data in a rapidly evolving crisis. Yet it has also captured an opposite issue: the spread of misinformation and disinformation during a public health crisis. Numerous governments have used the Covid-19 pandemic as reason to, legitimately or illegitimately, heighten existing state censorship practices or introduce new practices entirely under the justification of stopping false information about the virus. This report analyzes developments in China, India, and Russia as case studies of government censorship amid the public health crisis. It offers five key takeaways from these case studies. …
Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan
Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan
Joint PIJIP/TLS Research Paper Series
Global platforms such as YouTube, Facebook, Instagram or TikTok live on users ‘freely’ sharing content, in exchange for the data generated in the process. Many of these digital market actors nowadays employ automated copyright enforcement tools, allowing those who claim ownership to identify matching content uploaded by users. While most debates on state-sanctioned platform liability and automated private ordering by platforms has focused on the implications of user generated content being blocked, this paper places a spotlight on monetization. Using YouTube’s Content ID as principal example, I show how monetizing user content is by far the norm, and blocking the …
Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan
Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan
Articles in Law Reviews & Other Academic Journals
It was certainly an odd thing for the Department of Justice attorney arguing for the United States to appear before the Ninth Circuit to tell the appellate judges that a federal agency was wrong. This was what happened in a Federal Trade Commission enforcement action against Qualcomm Inc., a semiconductor technology company. As a substantial holder of patents on mobile communications technologies and also a leading manufacturer of chips used in that same industry, the FTC charged Qualcomm with anticompetitive conduct; the district court agreed and enjoined Qualcomm from certain patent licensing practices. It was that award of injunctive relief …
Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman
Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman
Articles in Law Reviews & Other Academic Journals
In 1995, the Internet was becoming a global phenomenon and users needed "domain names"--the street signs of Internet addresses--for an array of commercial and noncommercial speech. A small community of "multistakeholders"--business, civil society, governments, technologists, intellectual property and non-government organization representations--began to write rules for Internet addresses largely on behalf of a global population that had yet to be connected to the Internet. I had the privilege of being part of that group. Since then, Internet use has skyrocketed from 70 million users (1.7% of the world population) in 1995 to over 4.5 billion users (58.8% of the world population) …
Brief Fof The R Street Institutte, Public Knowledge, And The Niskanen Center As Amici Curiae In Support Of Petitioner, Charles Duan, Meredith F. Rose
Brief Fof The R Street Institutte, Public Knowledge, And The Niskanen Center As Amici Curiae In Support Of Petitioner, Charles Duan, Meredith F. Rose
Amicus Briefs
The Java SE declarations of this case are simply a language of commands. As an application programming interface, or API, they exhibit features common to any language: a structured vocabulary and grammatical syntaxes, which a computer system understands as instructions to perform predefined tasks. What Oracle accuses as infringement is “reimplementation,” namely the building of a system, in this case Google’s Android platform, that repurposes the same words and syntaxes of the Java declarations.
Brief Of The R Street Institute As Amicus Curiae In Support Of Petitioner, Charles Duan
Brief Of The R Street Institute As Amicus Curiae In Support Of Petitioner, Charles Duan
Amicus Briefs
It is a common but misleading premise of cases such as this one that the disappointed patent applicant has two options for judicial review: a 35 U.S.C. § 145 district court action and an appeal under 35 U.S.C. § 141. The applicant also has a non-judicial option: administrative remedies within the U.S. Patent and Trademark Office.
These administrative remedies add an important dimension to this case. The Court of Appeals adopted what it conceded was an atextual construction of § 145 expense recovery provision in order to ensure that § 145 actions were not cost-prohibitive to “small businesses and individual …
Speech Across Borders, Jennifer Daskal
Speech Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …
Brief For The R Street Institute As Amicus Curiae In Support Of Respondents, Charles Duan
Brief For The R Street Institute As Amicus Curiae In Support Of Respondents, Charles Duan
Amicus Briefs
The government and its agencies should be treated as a “person” that may petition to institute post-issuance review proceedings under the America Invents Act, for two reasons. First, permitting the government to seek review of patents under these proceedings best realizes the intent of Congress to make those proceedings widely available. Second, compared to the government’s alternative option for administratively challenging patents, AIA post-issuance review better serves important norms of procedure and governance, including transparency, due process, and separation of functions.
Atrocity Prevention In The New Media Landscape, Rebecca Hamilton
Atrocity Prevention In The New Media Landscape, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Journalists have traditionally played a crucial role in building public pressure on government officials to uphold their legal obligations under the 1948 UN Convention on the Prevention and Punishment of Genocide. But over the past twenty years there has been radical change in the media landscape: foreign bureaus have been shuttered, young freelance journalists have taken over some of the work traditionally done by experienced foreign correspondents, and, more recently, the advent of social media has enabled people in conflict-affected areas to tell their own stories to the world. This essay assesses the impact of these changes on atrocity prevention …
Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan
Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan
Amicus Briefs
Under 35 U.S.C. § 102, an inventor may not obtain a patent on an invention that has been “on sale” for more than a year. The question is whether, from this so-called on-sale bar, certain classes of sales should be exempted— sales under a confidentiality agreement, in Petitioner’s view; and sales to those other than the ultimate customers, according to the government.
Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson
Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson
Articles in Law Reviews & Other Academic Journals
In TC Heartland v. Kraft Foods Group Brands, the Supreme Court tightened the venue requirement for patent cases, making it more difficult for a plaintiff to demonstrate that a district court has venue over a defendant. Many commentators, however, view TC Heartland as merely a “reshuffling” of the district courts that receive patent cases. Whereas before the case, a large percentage of patent cases were filed in the Eastern District of Texas, now, after TC Heartland, various other U.S. district courts (principally, the District of Delaware) have experienced an increase in patent infringement filings. Some commentators are unconvinced that this …
Think Of An Elephant? Tweeting As "Framing" Executive Power, Fernando R. Laguarda
Think Of An Elephant? Tweeting As "Framing" Executive Power, Fernando R. Laguarda
Articles in Law Reviews & Other Academic Journals
No abstract provided.
User-Generated Evidence, Rebecca Hamilton
User-Generated Evidence, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …
Borders And Bits, Jennifer Daskal
Borders And Bits, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …