Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Law

Making Virtual Things, Joshua A.T. Fairfield Jan 2023

Making Virtual Things, Joshua A.T. Fairfield

Scholarly Articles

People value virtual things—such as NFTs—because such assets trigger and satisfy deep-seated narratives of property and ownership. The cause of the recent series of failures to regulate virtual assets, and the resulting crashes, has been a failure to take seriously the ways people perceive and use the assets. Current legal frameworks fail to support buyers’ and users’ expectations of ownership in virtual things they purchase.

Making virtual things is a matter of social construction of value. Virtual things, like real-world things, have value because a community values them for a purpose. It therefore makes no sense to discount how and …


Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai Jan 2022

Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai

Scholarly Articles

Much of the confusion about the proper regulation of smart contracts stems from the fact that both code and law are expressed in language. Natural (human) and formal (computer) languages are profoundly different, however. Natural language in the form of a true legal contract expresses human meaning and expectation. Code simply acts, and when code acts contrary to the understanding of the parties to a contract, courts must have a theoretical and legal basis in order to intervene--which this Article provides.

Present scholarship on the governance of smart contracts centers on logistical problems relating to the effects of automation on …


Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield Jan 2022

Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield

Scholarly Articles

Markets for unique digital property--digital equivalents of rare artworks, collectible trading cards, and other assets that gain value from scarcity--have exploded in the past few years. At root is the next iteration of blockchain technology, unique digital assets called non-fungible tokens. Unlike bitcoin, where one coin is the same as another, NFTs are unique, each with different attributes. An NFT that represented ownership of Boardwalk would be quite different from one that represented Baltic Avenue.

NFTs have grown from a few early breakout successes to a rapidly developing market for unique digital treasures. The attraction to buyers is that, unlike …


Property As The Law Of Virtual Things, Joshua A.T. Fairfield Jan 2022

Property As The Law Of Virtual Things, Joshua A.T. Fairfield

Scholarly Articles

Property law in the twentieth century moved from the law of things to the law of rights in things. This was a process of fragmentation: Under Hohfeldian property, we conceive of property as a bundle of sticks, and those sticks can be moved to different holders; the right to possess can be separated from the record ownership right, for example. The downside of Hohfeld's model is that physical objects—things—become informationally complicated. Thing-ness constrains the extravagances of Hohfeldian property: although we can split off the right to possess from the right to exclude, use, destroy, copy, manage, repair, and so on, …


Limiting The Boundaries Of Assisted Reproductive Technology And Physiological Autonomy, George P. Smith Ii Jan 2022

Limiting The Boundaries Of Assisted Reproductive Technology And Physiological Autonomy, George P. Smith Ii

Scholarly Articles

This essay examines, critically, the wide successes of assisted reproductive technology (ART). With these successes have come concerns regarding its potential advancement of the boundaries of fecundity and of new levels of physiological freedom. One particular advancement involves efforts to utilize a phenomenon of nature termed parthenogenesis, or asexual reproduction. The potential for adapting this occurrence as a form of assisted reproduction is of particular interest for members of the LGBTQ community, holding great promise for embryo research and regenerative medicine. Parthenogenetic embryos could be derived from unfertilized human eggs and, thus, blunt--if not resolve--ethical concerns over experimentation on human …


#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl Jan 2021

#Audited: Social Media And Tax Enforcement, Michelle Lyon Drumbl

Scholarly Articles

With limited resources and a diminished budget, it is not surprising that the Internal Revenue Service would seek new tools to maximize its enforcement efficiency. Automation and technology provide new opportunities for the IRS, and in turn, present new concerns for taxpayers. In December 2018, the IRS signaled its interest in a tool to access publicly available social media profiles of individuals in order to “expedite IRS case resolution for existing compliance cases.” This has important implications for taxpayer privacy.

Moreover, the use of social media in tax enforcement may pose a particular harm to an especially vulnerable population: low-income …


Federalism In The Algorithmic Age, Chad Squitieri Jan 2021

Federalism In The Algorithmic Age, Chad Squitieri

Scholarly Articles

The robots will not be pleased with Frank Pasquale. In New Laws of Robotics, the Brooklyn Law professor outlines two possible futures that can emerge from a growing conflict between human and robotic thought. The first is a future of robotic dominance. In that future, decisions traditionally made by human professionals (e.g., who goes to jail, what medicines are prescribed, and what news gets published) are decided by robots powered by artificially intelligent algorithms. The second future offers robots a less-favored role in the ordering of human affairs. Pasquale earns the displeasure of our would-be robotic overlords by outlining the …


The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield Jan 2019

The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield

Scholarly Articles

This Article constitutes a lightly edited transcription of Joshua Fairfield's oral remarks at the April 6, 2018 Cleveland State Law Review Symposium on Blockchain Law and Technology.

The author posits that there is a tendency to think that technology will emerge triumphant in resolving physical problems, including banking and transactional recording; that there is sort of a "tech-bro utopianism," epitomized by Mark Zuckerberg, suggesting that what we need is a technological, not a human, solution. He states that one major problem is that social technologists, psychologists, historians, linguists, and cultural anthropologists are not on the development teams that are building …


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Jan 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Scholarly Articles

Smart-city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage, and keep us healthy and safe. Its adoption is necessary because of changes that are predicted for urban dwellers over the next three decades; urban population and travel are predicted to increase dramatically and our population is graying, meaning the population will include a much greater number of elderly citizens. As these changes occur, smart-city technology can have a huge impact on public safety, improving the ability of law enforcement to investigate crimes, both with …


The Immediacy Of Genome Editing And Mitochondrial Replacement, Raymond C. O'Brien Jan 2019

The Immediacy Of Genome Editing And Mitochondrial Replacement, Raymond C. O'Brien

Scholarly Articles

After human DNA was first defined in 1953, the parallel science of assisted reproductive technology achieved a successful human birth through in vitro fertilization in 1978. Science then went on to facilitate gestational surrogacy, banking human reproductive materials, such as embryos, and greater opportunities for couples and individuals to become parents. Fertility clinics were established throughout the world to help persons and couples achieve parenthood, contributing to a steady increase in babies born through assisted reproductive means. Gradually, both federal and state laws in the United States were enacted to collect data from the fertility clinics, mandate insurance coverage of …


Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu Jan 2018

Cybersurveillance Intrusions And An Evolving Katz Privacy Test, Margaret Hu

Scholarly Articles

To contextualize why a new approach to the Fourth Amendment is essential, this Article describes two emerging cybersurveillance tools. The first Cybersurveillance tool, Geofeedia, has been deployed by state and local law enforcement. Geofeedia uses a process known as "geofencing" to draw a virtual barrier around a particular geographic region, and then identifies and tracks public social media posts within that region for predictive policing purposes. The second tool, Future Attribute Screening Technology (FAST), is under development by the United States Department of Homeland Security (DHS). FAST is another predictive policing tool that analyzes physiological and behavioral signals with the …


The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary Jan 2018

The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary

Scholarly Articles

Section 230 of the Communications Decency Act is a 1996 law wholly inadequate to address 21st Century problems. The most egregious example of this is online sex trafficking, which was allowed not only to exist, but also to thrive due, in large part, to §230. This Article examines the development of the jurisprudence regarding online advertising of sex-trafficking victims and juxtaposes the forces that created § 230 with those preventing its timely amendment. This Article argues that, although § 230 was never intended to create a regime of absolute immunity for defendant websites, a perverse interpretation of the non-sex …


Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary Jan 2018

Touch Dna And Chemical Analysis Of Skin Trace Evidence: Protecting Privacy While Advancing Investigations, Mary Graw Leary

Scholarly Articles

Forensic science transforms criminal investigations by resolving previously unsolvable cases and bringing an increased sense of justice to communities. This application of scientific disciplines to legal questions aids investigators in solving crimes. While many sciences can be utilized—such as physics (pattern evidence), chemistry (toxicology), or biology (cause of death), to name a few—two aspects of scientific advancement have played an outsized role in responding to crime. Trace evidence analysis—specifically, deoxyribonucleic acid (DNA) analysis—is an essential component to an effective and accurate criminal justice system. DNA evidence has emerged as a powerful tool to identify perpetrators of unspeakable crimes and to …


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Data Privacy And Inmate Recidivism, Chad Squitieri Jan 2016

Data Privacy And Inmate Recidivism, Chad Squitieri

Scholarly Articles

Private companies are awarded contracts to provide Internet technologies within jails and prisons. These correctional contractors often argue that their services can reduce recidivism rates by, for example, providing inmates with access to video messaging services where inmates can communicate with loved ones who are otherwise unable to travel to communicate in person. A close examination of the privacy policies offered by correctional contractors, however, reveals how efforts to reduce recidivism rates are undermined.

As this Essay will explain, correctional contractors collect sensitive data about inmates and the loved ones with whom they communicate. If this data is stolen or …


Who's The Vandal? The Recent Controversy Over The Destruction Of 5pointz And How Much Protection Does Moral Rights Law Give To Authorized Aerosol Art?, Susanna Frederick Fischer Jan 2015

Who's The Vandal? The Recent Controversy Over The Destruction Of 5pointz And How Much Protection Does Moral Rights Law Give To Authorized Aerosol Art?, Susanna Frederick Fischer

Scholarly Articles

This paper considers the extent to which federal moral rights law protects authorized graffiti and aerosol art against destruction, in the context of the controversy over the destruction of 5Pointz. 5Pointz, a sprawling complex of warehouse buildings in Queens, was a Mecca for aerosol art. The buildings’ owners ordered the demolition of 5Pointz after the November 2013 order by New York federal district judge Frederic Block denying the artists a preliminary injunction to stop destruction under the federal moral rights statute, the Visual Artists Rights Act (VARA). This paper argues that Judge Block erred in finding that the transient nature …


Confronting Big Data: Applying The Confrontation Clause To Government Big Data Collection, Chad Squitieri Jan 2015

Confronting Big Data: Applying The Confrontation Clause To Government Big Data Collection, Chad Squitieri

Scholarly Articles

When government investigators request data from companies such as Google, they obtain data on targeted individuals with a guarantee that the data has been collected, stored, and analyzed properly. These guarantees constitute a testimonial statement under the Confrontation Clause. Similar to lab analysts who submit test results of cocaine samples or blood alcohol levels, this Note argues that analysts involved with the collection, storage, and analysis of big data must be available for confrontation under the Sixth Amendment.


Digital Innocence, Joshua A.T. Fairfield, Erik Luna Jul 2014

Digital Innocence, Joshua A.T. Fairfield, Erik Luna

Scholarly Articles

Recent revelations have shown that almost all online activity and increasing amounts of offline activity are tracked using Big Data and data mining technologies. The ensuing debate has largely failed to consider an important consequence of mass surveillance: the obligation to provide access to information that might exonerate a criminal defendant. Although information technology can establish innocence—an ability that will only improve with technological advance—the fruits of mass surveillance have been used almost exclusively to convict. To address the imbalance and inform public dialogue, this Article develops the concept of “digital innocence” as a means of leveraging the tools of …


Sowing The Seeds Of Protection, Elizabeth I. Winston Jan 2014

Sowing The Seeds Of Protection, Elizabeth I. Winston

Scholarly Articles

Seeds are chattel. As such, seeds are protectable by the same tapestry of public and private ordering as other forms of chattel. However, the distinguishing characteristic of seeds, their method of propagation, and the history of seeds-traditionally viewed as a public good rather than chatteldistort that tapestry. The model of seed distribution thus needs to be refrained in light of the often disparate interests of innovators, producers, and consumers. As with all chattel, there is no single, correct model for distributing seeds, but law and contract may be woven together to strike a balance.


Applying Bioethics In The 21st Century: Principlism Or Situationism?, George P. Smith Ii Jan 2013

Applying Bioethics In The 21st Century: Principlism Or Situationism?, George P. Smith Ii

Scholarly Articles

After an examination of the four cardinal bioethical principles which define Principlism — autonomy, beneficence, non maleficence and justice — an explication of Joseph Fletcher’s theory of Situationism is undertaken.

The conclusion of this Article is that when an ethical dilemma arises and is “tested” as to its moral efficacy, rather than judge the acts in question in order to determine whether they are in conformance with one of the four bioethical principles, it is more humane and practical to determine the ethical propriety of questioned conduct by use of a situation ethic which in fact is more sensitive. This …


Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield Jan 2012

Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield

Scholarly Articles

Just as the Internet linked human knowledge through the simple mechanism of the hyperlink, now reality itself is being hyperlinked, indexed, and augmented with virtual experiences. Imagine being able to check the background of your next date through your cell phone, or experience a hidden world of trolls and goblins while you are out strolling in the park. This is the exploding technology of Mixed Reality, which augments real places, people, and things with rich virtual experiences.

As virtual and real worlds converge, the law that governs virtual experiences will increasingly come to govern everyday life. The problem is that …


Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield Jan 2012

Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield

Scholarly Articles

Researchers love virtual worlds. They are drawn to virtual worlds because of the opportunity to study real populations and real behavior in shared simulated environments. The growing number of virtual worlds and population growth within virtual worlds has led to a sizeable increase in the number of human subjects experiments taking place in such worlds.

Virtual world users care deeply about their avatars, their virtual property, their privacy, their relationships, their community, and their accounts. People within virtual worlds act much as they would in the physical world because the experience of the virtual world is “real” to them. The …


"Do-Not-Track" As Contract, Joshua A.T. Fairfield Jan 2012

"Do-Not-Track" As Contract, Joshua A.T. Fairfield

Scholarly Articles

Support for enforcement of a do-not-track option in browsers has been gathering steam. Such an option presents a simple method for consumers to protect their privacy. The problem is how to enforce this choice. The Federal Trade Commission (FTC) could enforce a do-not-track option in a consumer browser under its section 5 powers. The FTC, however, currently appears to lack the political will to do so. Moreover, the FTC cannot follow the model of its successful do-not-call list since the majority of Internet service providers (ISPs) assign Internet addresses dynamically — telephone numbers do not change, whereas Internet protocol (IP) …


The Challenges To Legal Education In 1973 And 2012: An Introduction To The Anniversary Issue Of The Hofstra Law Review, Nora V. Demleitner Jan 2012

The Challenges To Legal Education In 1973 And 2012: An Introduction To The Anniversary Issue Of The Hofstra Law Review, Nora V. Demleitner

Scholarly Articles

Not available.


The Technological Edge, Elizabeth I. Winston Jan 2012

The Technological Edge, Elizabeth I. Winston

Scholarly Articles

To grant a patent to natural phenomena hinders innovation, taking back from the public that which the public has a right to possess. To deny a patent to man’s manufacture undercuts the fundamental bargain of the patent system. All inventions, at their core, may be deemed natural, rendering it difficult to distinguish between man’s manufacture and natural phenomena. Determining whether the innovative aspect of the product is a technological one, rather than a natural one, can clarify whether the patent grant promotes the progress of science and the useful arts. The higher the level of skill in the art required …


Nexus Crystals: Crystallizing Limits On Contractual Control Of Virtual Worlds, Joshua A.T. Fairfield Jan 2011

Nexus Crystals: Crystallizing Limits On Contractual Control Of Virtual Worlds, Joshua A.T. Fairfield

Scholarly Articles

Can a video game developer or publisher successfully sue a video game player for copyright infringement for not “playing a game nicely,” “cheating,” or “buying software from a third party”? This article suggests a new reason why it cannot.

The founding social contract of the new millennium is the End User License Agreement (EULA), not the U.S. Constitution. Website terms of use (TOU) and software EULAs now have an enormous impact on how citizens must act and how their rights and redresses are defined. EULAs contain not only traditional intellectual property licensing conditions but complicated directives regarding what members of …


A Patent Misperception, Elizabeth I. Winston Jan 2011

A Patent Misperception, Elizabeth I. Winston

Scholarly Articles

Antitrust and intellectual property laws promote innovation and competition. As long as the costs of promotion do not exceed the benefit to society, then the laws act in harmony. Discord arises when patent holders use public and private ordering to restrain competition, restrict downstream trade, prevent the development of competing products and limit output by competitors. Using the Patent Act and the misperception of antitrust immunity to create a parallel and under-regulated legal system allows a small number of patent holders to coordinate their behavior to maximize profits and minimize competition. The Patent Act provides no shield to prosecution for …


Clarifying The Doctrine Of Inequitable Conduct, Elizabeth I. Winston Jan 2011

Clarifying The Doctrine Of Inequitable Conduct, Elizabeth I. Winston

Scholarly Articles

Addressing squarely the issue of the multiple standards of materiality in inequitable conduct litigation, Therasense v. Becton Dickinson raises many difficult issues that could be clarified through the lens of the analogous concept of fraud on the Trademark Office. The standards for finding fraud on the Trademark Office lack the ambiguity found in the doctrine of inequitable conduct, despite the parallel penalties of unenforceability and requirements of proof of materiality and intent. Informed by the many decisions of Judge Michel, this essay concludes that the standards for finding fraud before the Trademark Office, as set forth in In re Bose, …