No Safe Harbor: YouTube’s Content Id and Fair Use
Robert Andrea YouTube is arguably the world’s foremost platform for user-generated content. When users upload material to YouTube, there is a possibility that the uploaded content is protected by copyright. Under traditional copyright law, YouTube is technically liable for allowing copyrighted material to be disseminated. But the Digital Millennium Copyright Act (DMCA) insulates YouTube and other internet service providers from liability if the companies take certain steps to filter out copyrighted material. For YouTube, the only feasible way to fulfill its copyright protection obligations is to utilize automated copyright protection software. Nevertheless, YouTube’s software, Content ID, and the copyright policies...
Deep Fakes Accountability Act: Overbroad and Ineffective
Zachary Schapiro Improvements in technology have made it easy to create deep fakes: realistic false digital records depicting a person performing actions that did not occur. Although there are legitimate uses for deep fakes, like parodies or finishing a movie where a principal performer has died, they can inflict harm upon the individual depicted or the general public if, for example, used to influence the outcome of an election. Considering these detrimental uses, Congress has proposed the Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act of 2019 (DEEP FAKES Act) to impose civil...
Hackback to the Drawing Board: Ambiguity and Risk in the Active Cyber Defense Certainty Act
Robert Andrea Cyber criminals, both state-sponsored and unaffiliated, are targeting private corporations and individuals more frequently. For several years, there have been calls for legislation that would allow private entities to defend themselves in cyberspace by “hacking back” against their attackers. The Active Cyber Defense Certainty Act is a recent proposal to amend the Computer Fraud and Abuse Act to permit private entities to take active defensive measures without exposing themselves to criminal liability. Although a well-intentioned proposal, the bill uses vague language to identify when, and against whom, private entities can take defensive measures. Enabling private entities to begin...
Keeping Private Messages Private: End-to-End Encryption on Social Media
Steven Song Following recent data scandals, online users have become concerned that their private information on the Internet is susceptible to misappropriation. These concerns motivated data privacy regulations such as the General Data Protection Regulation and the California Consumer Privacy Act to ensure better protection against unauthorized access to personal data. Relatedly, Facebook has announced a plan to implement end- to-end encryption (E2EE) for all of its social media messaging systems. E2EE strictly limits access to private messages to the communicating parties. Even the company managing the messaging system cannot access these encrypted conversations. The implementation of E2EE, however, comes...
Neural Interfaces and Privacy Law: In Search of a Mind Meld
Alyson Tseng Neural interfaces are electronic devices that are placed on the brain and other parts of the neural system and can collect biometric and neurometric data. Rapid developments and commercialization of neural interfaces in the non-medical realm raise concernsregarding data privacy. The major privacy risks created by neural interfaces demonstrate the need for a sufficient regulatory framework that can adequately govern new technologies. Current laws are insufficient to regulate neural interfaces. This Essay proposes changes that a United States data protection law could adopt. It also encourages companies to consider digital ethics in the design of new technologies. Read...
Misbehaved Marks: Exploring the Implications of Iancu v. Brunetti
Devon Sanders In Iancu v. Brunetti, the Supreme Court decided that the First Amendment barred the United States Patent and Trademark Office from denying trademark registration for “immoral or scandalous” marks. This marked the first time that owners could register potentially obscene or derogatory marks. This decision changes the future of trademark registration and leaves lasting repercussions throughout trademark law in general. This Article explores the history of trademark law’s ban on registration for immoral or scandalous marks, recent judicial reform with Iancu v. Brunetti and its implications, and potential solutions to challenges caused by the decision. Read Full Text...
The Case for the Use of Facial Recognition Technology
Ye-Eun Sung Consumers often unknowingly enter brick-and-mortar stores that utilize facial recognition technology. Many are, therefore, at risk of their biometric data being wrongfully used without their consent or knowledge. The delay in the courts’ and the federal government’s response to facial recognition technology has allowed its development and use to remain unregulated. Although regulation of this technology is essential, its use should not be banned outright. Due to the changing retail landscape, facial recognition technology provides brick-and-mortar stores with information that allows them to remain relevant in a market that relies significantly on the internet and e-commerce. Read Full...
Use of Benefit Corporations to Accelerate Access to Affordable Vaccines
Julie Bateman Low- and middle-income countries face the heaviest burden from vaccine-preventable diseases, yet many of these countries cannot afford critical vaccines. Vaccines are often protected by patents so that pharmaceutical companies can recoup development costs. Consequently, vaccine manufacturers in developing countries must wait until the patents expire to produce lower-cost generic vaccines. Additionally, when the development of new vaccines relies on existing patents, such development is hindered. Benefit corporations offer an opportunity for the private and public sectors to align interests in accelerating critical vaccine development. Vaccine developers, restructured as benefit corporations, could commit to both special licensing agreements...
Apple Bites Back: An Antitrust Analysis of Qualcomm’s Licensing Practices
Marie Weisfeiler Both Apple and the Federal Trade Commission filed lawsuits against Qualcomm alleging antitrust violations. Specifically, both alleged that Qualcomm used its monopoly power to engage in unfair licensing practices and create an exclusive deal with Apple, in violation of its industry commitment to use fair practices in licensing its patents. This essay compares Qualcomm’s practices to those of Microsoft in 1998, which, because of Microsoft’s restrictive licensing and exclusive deals, were deemed to have violated the Sherman Act. It then considers the implications for licensing, technology, and antitrust law if a similar case is litigated in the future....
Patent Law in Space
Marie Weisfeiler The potential for private technological expansion into space raises questions of how to protect intellectual property rights of inventions that are both brought into space and made in space. While there are international treaties governing space law, none of these treaties discuss how to designate or enforce patent rights in space. The International Space Station has implemented a solution of quasi-territoriality to establish patent rights. This essay suggests, however, that this solution will be deficient when private entities venture further into space exploration. This essay then explores the possibility of a universal approach to patent law in space...