Category: Technology Law

2022Technology Law

Cyberwarfare and the Computer Fraud and Abuse Act

John Thurston As technology proliferates, cyberspace is becoming increasingly polluted with crime targeted at private enterprises. The escalation is the result of ineffective cybercrime laws. Although an international solution may be ideal, no treaty seems imminent. The U.S. government should focus on a more attainable solution in the short-term: amending the Computer Fraud and Abuse Act (CFAA). This Essay considers how revising the CFAA to allow qualified private companies to engage in offensive tactics would alter incentive structures. It concludes that such a revision would be an efficient solution to increase deterrence and reduce cybercrime. Read Full Text Here
2022Healthcare LawTechnology Law

Health-Tech Apps: Unclear Regulations and Their Effects on Progress

Emily Dieli The increased emphasis on creating a more streamlined healthcare system in the United States has led to a rise in digital health-tech apps and devices. To protect the privacy of personal health data on these technologies, policymakers have turned towards regulation. The Federal Trade Commission’s (FTC) recent statement on the Health Breach Notification (HBN) Rule has extended the scope of the 2009 regulation to include previously unregulated health-tech entities. Nevertheless, the statement is vague and will have a negative impact on health-tech innovation. Policymakers should consider the implications of their regulations on health-tech progress before making such hasty...
2022Technology Law

Through the Spying-Glass: Data Privacy Concerns Regarding Mobile Spyware Apps

Payton P. Reisinger Spyware app surveillance technologies are rising in popularity for both legitimate monitoring and also to illegally spy on unsuspecting victims. In 2021, the Federal Trade Commission (FTC) issued its first ban of a spyware app, SpyFone, due to deceptive and unfair trade practices and lack of data security provisions. Some call for specific legislation to curb the effects of growing spyware apps, but opponents of regulation claim that legislative efforts will be too restrictive on growing technological industries or the legitimate uses of spyware apps. This Essay agrees with the policy rationale for implementing spyware legislation and...
2021Technology Law

Regulating the Unregulatable: The Digital Commodity Exchange Act’s Use- Based Approach to Cryptocurrency Regulation

Becky Powell Since the creation of Bitcoin in 2008, the cryptocurrency market has grown exponentially and remained relatively free from government oversight. Only within the last five years have federal agencies begun to regulate the risks the industry poses. Their response to date, though, has been piecemeal because they lack explicit, statutory jurisdiction over the industry. As a result, the cryptocurrency market faces several risks that threaten to derail its future growth. For one, the industry is a playground for criminal activity, including everything from money laundering to fraud to cyberattacks. The market is also extremely volatile, and consumers have...
2021Healthcare LawTechnology Law

Mind over Data: A Case for Increased Privacy Protections in Mobile Mental Health Apps

Marian Lemont As mobile mental health apps gain popularity as an emotional support alternative, privacy concerns regarding how consumers’ sensitive health data is handled are at an all-time high. Current federal privacy provisions provide insufficient consumer protection and thus render consumers’ sensitive information vulnerable to unwanted third-party sharing practices. The recently passed California Privacy Rights Act of 2020 (CPRA) includes new provisions governing businesses’ handling and deletion of sensitive user data. This article discusses how these new CPRA provisions provide a helpful framework to begin addressing this regulatory gap and identifies ways future privacy legislation can continue to strengthen mobile...
2021Technology Law

The Intersection of Product Liability Law and the Internet of Things

Lucas M. Amodio Every year, an increasing number of Internet of Things devices are released. These devices can make our lives easier, but they also make our data, and potentially ourselves, more vulnerable to hackers. The question is no longer theoretical, as many of these devices can have a real impact on the world around them, like a networked sprinkler system that, if hacked, could flood a target’s basement. Going forward, we can look to the current law of product liability and the Federal Trade Commission to protect individuals from harm and loss when these devices might be compromised. Read...
2021Technology Law

The Facebook Diem Project: Can Big Tech Create Its Own Currencies?

Jo-an Chen Cryptocurrencies are rising in popularity as both a means for investment and a medium for exchange for goods and services. In 2019, Facebook announced its intent to create a new stablecoin cryptocurrency called Libra as a means to promote financial inclusion and access to the unbanked population. After its initial failed launch in 2019 due to heavy regulatory criticism over data privacy, money laundering, and financial instability concerns, Facebook is once again seeking to relaunch the Diem Project in 2021. This Essay discusses the potential social benefits, the disruption to financial institutions, and the regulatory challenges that the...
2021Technology Law

A Vendetta Against Alexa: Privacy Concerns in the Age of the Smart Home

Katherine Minorini A person’s right to privacy is so fundamental that it was written into the United States Constitution under the Fourth Amendment. This right, although protected, is not absolute, especially in circumstances involving voluntary disclosure of information to third parties. Issues arise when the third-party exception to the Fourth Amendment is coupled with the novel capabilities and innovations of the Internet of Things, especially with the smart home. This Essay argues that courts need to adapt their interpretation and application of the third-party doctrine so that information disclosed to and recorded by smart home manufacturers and servers respects Fourth...
2021Technology Law

The Liquidation of Data Privacy: How an Outdated Bankruptcy Code Threatens Consumer Information

Michael R. Akselrad In the modern world, billions of people share personal information online every day, ranging from consumer preferences to biometric and genetic identifiers, leading to the commoditization of user data, the value of which may dwarf the other assets of even large, multinational corporations. In the ordinary course of business, this user data may be kept confidential through such measures as privacy policies, statutory protections, and the reputational backlash facing a company that acts too brazenly with users’ sensitive information. In bankruptcy, however, some of these safeguards are eliminated in the interest of maximizing the value of the...
2021Technology Law

The Great Equalizer: Education or Technology?

Amy Lobue This Essay evaluates the structure of technology funding in education and how it has impacted students’ access to quality instruction throughout the COVID-19 pandemic. As access to education throughout the pandemic depended on students’ and schools’ abilities to procure access to connected devices, some students were left with minimal to no instruction. Further, the pandemic sheds light on the existing technology access inequities that trace the lines between socioeconomic classes. First, technology access is defined as a two-fold issue: access to the internet, and access to devices other than smartphones. This Essay presents the current federal funding structure...