Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,613 Full-Text Articles 3,363 Authors 1,637,661 Downloads 113 Institutions

All Articles in Computer Law

Faceted Search

3,613 full-text articles. Page 7 of 97.

Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross 2019 Selected Works

Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross

John Cross

This article discusses the process of innovation and releasing so-called negative information to help others in the process to innovate. The article focuses on patent law and asks the questions: Why do people innovate? Does the legal system really reflect how the process of innovation actually occurs?


Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross 2019 Selected Works

Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross

John Cross

Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector ...


The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano 2019 Elisabeth Haub School of Law at Pace University

The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano

Pace Law Review

The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to ...


Platforms, The First Amendment And Online Speech: Regulating The Filters, Sofia Grafanaki 2019 Pace University

Platforms, The First Amendment And Online Speech: Regulating The Filters, Sofia Grafanaki

Pace Law Review

In recent years, online platforms have given rise to multiple discussions about what their role is, what their role should be, and whether they should be regulated. The complex nature of these private entities makes it very challenging to place them in a single descriptive category with existing rules. In today’s information environment, social media platforms have become a platform press by providing hosting as well as navigation and delivery of public expression, much of which is done through machine learning algorithms. This article argues that there is a subset of algorithms that social media platforms use to filter ...


Online Terms As In Terrorem Devices, Colin P. Marks 2019 University of Maryland Francis King Carey School of Law

Online Terms As In Terrorem Devices, Colin P. Marks

Maryland Law Review

Online shopping has quickly replaced the brick-and-mortar experience for a large portion of the consuming public. The online transaction itself is rote: browse items, add them to your cart, and check out. Somewhere along the way, the consumer is likely made aware of (or at least exposed to) the merchant’s terms and conditions, via either a link or a pop-up box. Such terms and conditions have become so ubiquitous that most consumers would be hard-pressed to find a merchant that doesn’t try to impose them somewhere on their website. Though such terms and conditions are pervasive, most consumers ...


Cybersecurity Oversight Liability, Benjamin P. Edwards 2019 University of Nevada, Las Vegas William S. Boyd School of Law

Cybersecurity Oversight Liability, Benjamin P. Edwards

Georgia State University Law Review

A changing cybersecurity environment now poses a significant corporate-governance challenge. Although some cybersecurity data breaches may be inevitable, courts now increasingly consider when a corporation’s officers and directors may be held liable on theories that they acted in bad faith and failed to adequately oversee the corporation’s affairs. This short essay reviews recent derivative decisions and encourages corporate boards to recognize that in an environment filled with increasing threats, a reasonable response will require devoting real resources and attention to cybersecurity issues.


Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. McCarthy, Mark Visger 2019 University of Maryland Francis King Carey School of Law

Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger

Maryland Law Review

Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this ...


Debugging The Tallinn Manual 2.0'S Application Of The Due Diligence Principle To Cyber Operations, Colin Patrick 2019 University of Washington School of Law

Debugging The Tallinn Manual 2.0'S Application Of The Due Diligence Principle To Cyber Operations, Colin Patrick

Washington International Law Journal

As global cyber connectivity increases, so does opportunities for large-scale nefarious cyber operations. These novel circumstances have necessitated the application of old-world customs to an increasingly complex world. To meet this challenge, the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations was created. The Manual provides 154 black letter rules detailing how international law applies to cyber operations during peacetime. Of particular import is the Manual’s interpretation of the due diligence principle. This principle, which defines the contours of a state’s obligation to prevent their territory to inflict extraterritorial harm, is increasingly significant in ...


Front Matter, 2019 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Digital Forensics, A Need For Credentials And Standards, Nima Zahadat 2019 University of Baltimore

Digital Forensics, A Need For Credentials And Standards, Nima Zahadat

Journal of Digital Forensics, Security and Law

The purpose of the conducted study was to explore the credentialing of digital forensic investigators, drawing from applicable literature. A qualitative, descriptive research design was adopted which entailed searching across Google Scholar and ProQuest databases for peer reviewed articles on the subject matter. The resulting scholarship was vetted for timeliness and relevance prior to identification of key ideas on credentialing. The findings of the study indicated that though credentialing was a major issue in digital forensics with an attentive audience of stakeholders, it had been largely overshadowed by the fundamental curricula problems in the discipline. A large portion of research ...


Policing Cyberspace: The Uncertain Future Of Data Privacy And Security Enforcement In The Wake Of Labmd, Julia Whall 2019 Boston College Law School

Policing Cyberspace: The Uncertain Future Of Data Privacy And Security Enforcement In The Wake Of Labmd, Julia Whall

Boston College Law Review

On June 6, 2018, in LabMD, Inc. v. Federal Trade Commission (LabMD III), the U.S. Court of Appeals for the Eleventh Circuit vacated a Federal Trade Commission order that required a small medical laboratory to maintain a reasonable data security program following a data breach. The case presented the Eleventh Circuit with the opportunity to clarify the FTC’s data privacy and security enforcement powers under Section 5 of the FTC Act. The court, however, only addressed this issue briefly in dicta, and instead held that the order was unenforceable because it was overly-broad. This Comment argues that Eleventh ...


Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan 2019 New York University

Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan

J.B. Ruhl

Legal and policy scholars modeling direct actions into substantive topic classifications thus far have not employed computational methods. To compare the results of their conventional modeling methods with the computational method, we generated computational topic models of all direct actions over time periods other scholars have studied using conventional methods, and did the same for a case study of environmental-policy direct actions. Our computational model of all direct actions closely matched one of the two comprehensive empirical models developed using conventional methods. By contrast, our environmental-case-study model differed markedly from the only empirical topic model of environmental-policy direct actions using ...


Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes 2019 Washington and Lee University School of Law

Bytes Bite: Why Corporate Data Breaches Should Give Standing To Affected Individuals, Caden Hayes

Washington and Lee Journal of Civil Rights and Social Justice

High-profile data hacks are not uncommon. In fact, according to the Privacy Rights Clearinghouse, there have been at least 7,961 data breaches, exposing over 10,000,000,000 accounts in total, since 2005. These shocking numbers are not particularly surprising when taking into account the value of information stolen. For example, cell phone numbers, as exposed in a Yahoo! hack, are worth $10 a piece on the black market, meaning the hackers stood to make $30,000,000,000 from that one hack. That dollar amount does not even consider copies the hackers could make and later resell. Yet ...


Crashworthy Code, Bryan H. Choi 2019 University of Washington School of Law

Crashworthy Code, Bryan H. Choi

Washington Law Review

Code crashes. Yet for decades, software failures have escaped scrutiny for tort liability. Those halcyon days are numbered: self-driving cars, delivery drones, networked medical devices, and other cyber-physical systems have rekindled interest in understanding how tort law will apply when software errors lead to loss of life or limb. Even after all this time, however, no consensus has emerged. Many feel strongly that victims should not bear financial responsibility for decisions that are entirely automated, while others fear that cyber-physical manufacturers must be shielded from crushing legal costs if we want such companies to exist at all. Some insist the ...


Modernizing The Stockholder Shield: How Blockchains And Distributed Ledgers Could Rescue The Appraisal Remedy, Brandon Ferrick 2019 Boston College Law School

Modernizing The Stockholder Shield: How Blockchains And Distributed Ledgers Could Rescue The Appraisal Remedy, Brandon Ferrick

Boston College Law Review

A recent wave of appraisal litigation has highlighted costly flaws in Delaware’s appraisal law. The genesis of the problems stems from dilapidated assumptions about stock ownership and corporate record keeping baked into the Delaware General Corporation Law. Technological advancements, namely distributed ledgers and blockchain technology, promise to bring Delaware’s appraisal law into the twenty-first century while remaining consistent with existing appraisal law. Distributed ledgers and blockchain technology promise lightning fast clearing times, infallible record keeping, and cost-efficient modes of transfer. States, private actors, and laypersons are already recognizing the litany of benefits offered by these technologies. This Note ...


Is Trolling Trump A Right Or A Privilege?: The Erroneous Finding In Knight First Amendment Institute At Columbia University V. Trump, Lauren Beausoleil 2019 Boston College Law School

Is Trolling Trump A Right Or A Privilege?: The Erroneous Finding In Knight First Amendment Institute At Columbia University V. Trump, Lauren Beausoleil

Boston College Law Review

On May 23, 2018, in Knight First Amendment Institute at Columbia University v. Trump, the United States District Court for the Southern District of New York considered whether the President of the United States violated the First Amendment rights of individuals by blocking them on Twitter. In doing so, the district court agreed with the plaintiffs’ allegations that blocking constituted impermissible viewpoint discrimination in the context of a public forum. Despite the long history of the public forum doctrine, the information age has presented new questions regarding the doctrine, and Knight First Amendment Institute marks the first instance in which ...


Table Of Contents, Seattle University Law Review 2019 Seattle University School of Law

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


Breaches Within Breaches: The Crossroads Of Erisa Fiduciary Responsibilities And Data Security, Gregg Moran 2019 University of Miami Law School

Breaches Within Breaches: The Crossroads Of Erisa Fiduciary Responsibilities And Data Security, Gregg Moran

University of Miami Law Review

Although the drafters of the Employee Retirement Income Security Act of 1974 (“ERISA”) likely could not have anticipated the data security issues of the twenty-first century, ERISA’s duty of prudence almost certainly requires employee benefit plan fiduciaries to protect sensitive participant data in at least some manner. This Article suggests the Department of Labor should issue a regulation clarifying fiduciaries’ data security obligations. Given that fiduciaries are in the best positions to recognize their plans’ individual security needs and capabilities, the regulation should not attempt to micromanage fiduciaries’ substantive data security policies; rather, it should focus on the procedures ...


The Privacy Hierarchy: A Comparative Analysis Of The Intimate Privacy Protection Act Vs. The Geolocational Privacy And Surveillance Act, Katherine A. Mitchell 2019 University of Miami Law School

The Privacy Hierarchy: A Comparative Analysis Of The Intimate Privacy Protection Act Vs. The Geolocational Privacy And Surveillance Act, Katherine A. Mitchell

University of Miami Law Review

The advent of the technological boom brought the world smartphones, social media, and Siri. These novel benefits, however, were accompanied by unchartered invasions of privacy. Congress has embarked on the seemingly endless path of protecting its constituents through civil and criminal legislation aimed at combatting such invasions. Two recent examples include the Intimate Privacy Protection Act (“IPPA”) and the Geolocational Privacy and Surveillance Act (“GPS Act”). Nonetheless, the IPPA, which was proposed to criminalize the dissemination of nonconsensual pornography, has garnered much less support—and much more criticism—than its geolocational counterpart.

This Note discusses the striking similarities of both ...


Big Data Discrimination: Maintaining Protection Of Individual Privacy Without Disincentivizing Businesses’ Use Of Biometric Data To Enhance Security, Lauren Stewart 2019 Boston College Law School

Big Data Discrimination: Maintaining Protection Of Individual Privacy Without Disincentivizing Businesses’ Use Of Biometric Data To Enhance Security, Lauren Stewart

Boston College Law Review

Biometric identification technology is playing an increasingly significant role in the lives of consumers in the United States today. Despite the benefits of increased data security and ease of consumer access to businesses’ services, lack of widespread biometric data regulation creates the potential for commercial misuse. Of particular concern is the use of biometric data by businesses, such as those within the data broker industry, to enable opaque discrimination against consumers. Although some states, such as Illinois, Texas, and Washington, have adopted comprehensive biometric data regulation statutes, the statutes do not offer a consistent approach. This Note argues that Congress ...


Digital Commons powered by bepress