Author: iptf

2022Technology Law

A Comparative Study of Nuclear Reactor Standardization Policy in the United States and France

Margaret Cooney As the United States moves to reduce its carbon footprint, nuclear energy has become an essential energy alternative to fossil fuels. The current U.S. nuclear fleet is aging and will soon be decommissioned, so building new reactors is essential for U.S. energy production needs. In building a new generation of nuclear reactors, the United States may consider looking to France for inspiration. France’s reactor fleet is highly standardized, meaning that there are only a few reactor designs. There are potential benefits and drawbacks to standardization in nuclear technology. Some scholars argue that a policy of standardization would lower...
2022Copyright

Choreographic Works in the Age of Social Media: The Issues and Implications of Copyrighting TikTok Dances

Patricia Garza Gonzalez Keara Wilson, the creator of the “Savage” dance on TikTok successfully registered her dance as a choreographic work with the U.S. Copyright Office, making it the first viral TikTok dance protected under the Copyright Act of 1976. She is one of numerous TikTok dance creators seeking copyright protection for their works as the social media platform has bolstered dance dissemination through dance challenges that encourage users to reproduce and post their versions of short routines. Nevertheless, under the current guidelines for choreographic work copyright, TikTok dances are not entitled to copyright protections because of their categorization as...
2022Technology Law

Cyberwarfare and the Computer Fraud and Abuse Act

John Thurston As technology proliferates, cyberspace is becoming increasingly polluted with crime targeted at private enterprises. The escalation is the result of ineffective cybercrime laws. Although an international solution may be ideal, no treaty seems imminent. The U.S. government should focus on a more attainable solution in the short-term: amending the Computer Fraud and Abuse Act (CFAA). This Essay considers how revising the CFAA to allow qualified private companies to engage in offensive tactics would alter incentive structures. It concludes that such a revision would be an efficient solution to increase deterrence and reduce cybercrime. Read Full Text Here
2022Copyright

Digital Art Says: Protect Our “Groove” Too

Annie Kim Digital technology has become one of the most common methods artists use to create art. This advancement in technology causes many copyright difficulties, especially related to artists’ styles. Standardized and common features of digital software have made it far too easy for people to duplicate other people’s work, and more significantly, an artist’s unique style. Current copyright laws are insufficient to address these issues, and there is almost no legal precedent related to protecting an artist’s “art style.” In a groundbreaking case, Williams v. Gaye, the court implemented a two-part test to imply protection for musical styles, the...
2022CopyrightTrademark

From Canvas to Designer Cloth: The Exploitative Nature of the Fair Use Doctrine in the Arts

Victoria Schmidt This Essay examines the controversial launch of the 2020 COACH® x Basquiat Collection featuring the signature image of Jean- Michel Basquiat on Coach purses and clothing. These signature images were part of a larger work of art by Basquiat that aimed to critique racial segregation, police brutality, and the capitalistic pull of American society. Basquiat supporters critique the collaboration as a misappropriation of the artist’s message. Under this assumption, this Essay evaluates the scope of the fair use doctrine through a hypothetical copyright infringement claim against Coach. This Essay examines the provisions of current copyright laws and advocates...
2022Copyright

Videogame Broadcasting: Exploring a Growing Industry’s Struggle with Copyright Claims

Zachary Greenberg In the videogame industry, tournament play is crucial for game publishers in creating a loyal fan base. Tournament play has spurred the development of third-party markets including streaming, commentary, and “modding”—creating complementary software for existing games. This essay will examine the intertwined industries of videogames and streaming tournaments, and their turbulent relationship with copyright law through a case study of Super Smash Bros. Melee. In addition to exploring Nintendo’s valid claims for protection under copyright law, this essay will analyze possible solutions to streaming copyright violations utilizing the fair use defense, including wider industry changes like implementing mechanical...
2022Healthcare LawTechnology Law

Health-Tech Apps: Unclear Regulations and Their Effects on Progress

Emily Dieli The increased emphasis on creating a more streamlined healthcare system in the United States has led to a rise in digital health-tech apps and devices. To protect the privacy of personal health data on these technologies, policymakers have turned towards regulation. The Federal Trade Commission’s (FTC) recent statement on the Health Breach Notification (HBN) Rule has extended the scope of the 2009 regulation to include previously unregulated health-tech entities. Nevertheless, the statement is vague and will have a negative impact on health-tech innovation. Policymakers should consider the implications of their regulations on health-tech progress before making such hasty...
2022Technology Law

Through the Spying-Glass: Data Privacy Concerns Regarding Mobile Spyware Apps

Payton P. Reisinger Spyware app surveillance technologies are rising in popularity for both legitimate monitoring and also to illegally spy on unsuspecting victims. In 2021, the Federal Trade Commission (FTC) issued its first ban of a spyware app, SpyFone, due to deceptive and unfair trade practices and lack of data security provisions. Some call for specific legislation to curb the effects of growing spyware apps, but opponents of regulation claim that legislative efforts will be too restrictive on growing technological industries or the legitimate uses of spyware apps. This Essay agrees with the policy rationale for implementing spyware legislation and...