Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Law

Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Trusted Framework For Cross-Border Data Flows, Alex Joel Sep 2023

A Trusted Framework For Cross-Border Data Flows, Alex Joel

Joint PIJIP/TLS Research Paper Series

The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …


Opaque Notification: A Country-By-Country Review, Lauren Mantel Jun 2023

Opaque Notification: A Country-By-Country Review, Lauren Mantel

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel Mar 2023

Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel

Joint PIJIP/TLS Research Paper Series

The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.


Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi Jan 2023

Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll Apr 2022

Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

This Essay turns questions about artificial intelligence and copyright law around. Rather than focus on algorithms as potential authors, this Essay argues for more attention to the role of algorithms as gatekeepers on social media and how creators adapt their creative choices to meet the demands of these automated tastemakers. Using TikTok’s “For You” algorithm and its role in breaking Lil Nas X’s hit song “Old Town Road” as a case study, this Essay poses the question whether algorithmic gatekeeping is simply a difference in degree or a difference in kind from an artist’s perspective. While tentative, this Essay concludes …


Game Theory Optimized Fraud: How The Unlawful Internet Gambling Enforcement Act Created A Virtually Riskless Environment For White Collar Crime In Online Poker, Jeffrey Woolf Jan 2022

Game Theory Optimized Fraud: How The Unlawful Internet Gambling Enforcement Act Created A Virtually Riskless Environment For White Collar Crime In Online Poker, Jeffrey Woolf

Upper Level Writing Requirement Research Papers

No abstract provided.


Protecting Children In The Age Of End-To-End Encryption, Laura Draper Jan 2022

Protecting Children In The Age Of End-To-End Encryption, Laura Draper

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman Jul 2021

Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Regulating The Digital Resonance, Hassan Salman May 2021

Regulating The Digital Resonance, Hassan Salman

Upper Level Writing Requirement Research Papers

No abstract provided.


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan Jan 2021

A Tale Of Two Interoperabilities; Or, How Google V. Oracle Could Become Social Media Legislation, Charles Duan

Articles in Law Reviews & Other Academic Journals

The Supreme Court'srecent decision in Google LLC v. Oracle America, Inc. has provided the latest word on an issue that many have described as "interoperability," and it comes at a time when lawmakers around the world are debating a policy called "interoperability" with respect to majorInternetplatforms. At first glance, these two similarly named policy conversations copyright protection of software interfaces and interconnection among competing Internet platforms, respectively have little to do with each other. Yet they are vitally intertwined: the activities and issues featured in Google are so closely linked to the questions of digital competition that interoperability reforms directed …


“Hey Siri, I’M Being Pulled Over.”, Charlene Collazo Goldfield, Gabriela Chambi, Amanda Torres Jan 2021

“Hey Siri, I’M Being Pulled Over.”, Charlene Collazo Goldfield, Gabriela Chambi, Amanda Torres

Joint PIJIP/TLS Research Paper Series

Statistics show that policing disproportionately affects communities of color; police are more likely to use force against Black and brown people.1 Data from non-violent encounters (e.g., reason for the stop, type of force used, and presence of witnesses) is rarely collected or disregarded altogether.2 Video evidence can publicize police violence. Bystander video during George Floyd’s murder led to arrests and a global racial reckoning because it depicted the reality of police encounters for people of color. Although technological advancements have led to positive developments for civilian safety (e.g., body cameras and in-car videos), data collection consistency and accountability …


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Who's Afraid Of Section 1498? A Case For Government Patent Use In Pandemics And Other National Crisis, Charles Duan, Christopher J. Morten Oct 2020

Who's Afraid Of Section 1498? A Case For Government Patent Use In Pandemics And Other National Crisis, Charles Duan, Christopher J. Morten

Articles in Law Reviews & Other Academic Journals

COVID-19 has created pressing and widespread needs for vaccines, medical treatments, PPE, and other medical technologies, needs that may conflict--indeed, have already begun to conflict--with the exclusive rights conferred by United States patents. The U.S. government has a legal mechanism to overcome this conflict: government use of patented technologies at the cost of government paid compensation under 28 U. S.C. § 1498. But while many have recognized the theoretical possibility of government patent use under that statute, there is today conventional wisdom that § 1498 is too exceptional, unpredictable, and dramatic for practical use, to the point that it ought …


Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn Sep 2020

Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman Aug 2020

Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman

Joint PIJIP/TLS Research Paper Series

The Covid-19 pandemic has illustrated the importance of accurate, real-time information and empirical data in a rapidly evolving crisis. Yet it has also captured an opposite issue: the spread of misinformation and disinformation during a public health crisis. Numerous governments have used the Covid-19 pandemic as reason to, legitimately or illegitimately, heighten existing state censorship practices or introduce new practices entirely under the justification of stopping false information about the virus. This report analyzes developments in China, India, and Russia as case studies of government censorship amid the public health crisis. It offers five key takeaways from these case studies. …


Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan Jul 2020

Automated Copyright Enforcement Online: From Blocking To Monetization Of User-Generated Content, Henning Grosse Ruse-Khan

Joint PIJIP/TLS Research Paper Series

Global platforms such as YouTube, Facebook, Instagram or TikTok live on users ‘freely’ sharing content, in exchange for the data generated in the process. Many of these digital market actors nowadays employ automated copyright enforcement tools, allowing those who claim ownership to identify matching content uploaded by users. While most debates on state-sanctioned platform liability and automated private ordering by platforms has focused on the implications of user generated content being blocked, this paper places a spotlight on monetization. Using YouTube’s Content ID as principal example, I show how monetizing user content is by far the norm, and blocking the …


Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan May 2020

Of Monopolies And Monocultures: The Intersection Of Patents And National Security, Charles Duan

Articles in Law Reviews & Other Academic Journals

It was certainly an odd thing for the Department of Justice attorney arguing for the United States to appear before the Ninth Circuit to tell the appellate judges that a federal agency was wrong. This was what happened in a Federal Trade Commission enforcement action against Qualcomm Inc., a semiconductor technology company. As a substantial holder of patents on mobile communications technologies and also a leading manufacturer of chips used in that same industry, the FTC charged Qualcomm with anticompetitive conduct; the district court agreed and enjoined Qualcomm from certain patent licensing practices. It was that award of injunctive relief …


Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman Feb 2020

Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman

Articles in Law Reviews & Other Academic Journals

In 1995, the Internet was becoming a global phenomenon and users needed "domain names"--the street signs of Internet addresses--for an array of commercial and noncommercial speech. A small community of "multistakeholders"--business, civil society, governments, technologists, intellectual property and non-government organization representations--began to write rules for Internet addresses largely on behalf of a global population that had yet to be connected to the Internet. I had the privilege of being part of that group. Since then, Internet use has skyrocketed from 70 million users (1.7% of the world population) in 1995 to over 4.5 billion users (58.8% of the world population) …


Brief Fof The R Street Institutte, Public Knowledge, And The Niskanen Center As Amici Curiae In Support Of Petitioner, Charles Duan, Meredith F. Rose Jan 2020

Brief Fof The R Street Institutte, Public Knowledge, And The Niskanen Center As Amici Curiae In Support Of Petitioner, Charles Duan, Meredith F. Rose

Amicus Briefs

The Java SE declarations of this case are simply a language of commands. As an application programming interface, or API, they exhibit features common to any language: a structured vocabulary and grammatical syntaxes, which a computer system understands as instructions to perform predefined tasks. What Oracle accuses as infringement is “reimplementation,” namely the building of a system, in this case Google’s Android platform, that repurposes the same words and syntaxes of the Java declarations.


Brief Of The R Street Institute As Amicus Curiae In Support Of Petitioner, Charles Duan May 2019

Brief Of The R Street Institute As Amicus Curiae In Support Of Petitioner, Charles Duan

Amicus Briefs

It is a common but misleading premise of cases such as this one that the disappointed patent applicant has two options for judicial review: a 35 U.S.C. § 145 district court action and an appeal under 35 U.S.C. § 141. The applicant also has a non-judicial option: administrative remedies within the U.S. Patent and Trademark Office.

These administrative remedies add an important dimension to this case. The Court of Appeals adopted what it conceded was an atextual construction of § 145 expense recovery provision in order to ensure that § 145 actions were not cost-prohibitive to “small businesses and individual …


Speech Across Borders, Jennifer Daskal Jan 2019

Speech Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …


Brief For The R Street Institute As Amicus Curiae In Support Of Respondents, Charles Duan Jan 2019

Brief For The R Street Institute As Amicus Curiae In Support Of Respondents, Charles Duan

Amicus Briefs

The government and its agencies should be treated as a “person” that may petition to institute post-issuance review proceedings under the America Invents Act, for two reasons. First, permitting the government to seek review of patents under these proceedings best realizes the intent of Congress to make those proceedings widely available. Second, compared to the government’s alternative option for administratively challenging patents, AIA post-issuance review better serves important norms of procedure and governance, including transparency, due process, and separation of functions.


Atrocity Prevention In The New Media Landscape, Rebecca Hamilton Jan 2019

Atrocity Prevention In The New Media Landscape, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Journalists have traditionally played a crucial role in building public pressure on government officials to uphold their legal obligations under the 1948 UN Convention on the Prevention and Punishment of Genocide. But over the past twenty years there has been radical change in the media landscape: foreign bureaus have been shuttered, young freelance journalists have taken over some of the work traditionally done by experienced foreign correspondents, and, more recently, the advent of social media has enabled people in conflict-affected areas to tell their own stories to the world. This essay assesses the impact of these changes on atrocity prevention …


Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan Oct 2018

Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan

Amicus Briefs

Under 35 U.S.C. § 102, an inventor may not obtain a patent on an invention that has been “on sale” for more than a year. The question is whether, from this so-called on-sale bar, certain classes of sales should be exempted— sales under a confidentiality agreement, in Petitioner’s view; and sales to those other than the ultimate customers, according to the government.


Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson Jan 2018

Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson

Articles in Law Reviews & Other Academic Journals

In TC Heartland v. Kraft Foods Group Brands, the Supreme Court tightened the venue requirement for patent cases, making it more difficult for a plaintiff to demonstrate that a district court has venue over a defendant. Many commentators, however, view TC Heartland as merely a “reshuffling” of the district courts that receive patent cases. Whereas before the case, a large percentage of patent cases were filed in the Eastern District of Texas, now, after TC Heartland, various other U.S. district courts (principally, the District of Delaware) have experienced an increase in patent infringement filings. Some commentators are unconvinced that this …


Think Of An Elephant? Tweeting As "Framing" Executive Power, Fernando R. Laguarda Jan 2018

Think Of An Elephant? Tweeting As "Framing" Executive Power, Fernando R. Laguarda

Articles in Law Reviews & Other Academic Journals

No abstract provided.


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …