Tag: technology

2020Technology Law

Data Privacy Concerns Regarding COVID-19 Contact Tracing Apps and Implications for the Field of Cybersecurity

Elana Lerner Brockmann The COVID-19 public health emergency has led to the development of contact tracing apps that enable governments and public health officials to track outbreaks and take appropriate measures in response. Contact tracing apps also allow individuals to be notified of potential contacts with infected individuals, promoting self-quarantine and reducing further spread of the virus. Although contact tracing apps have the potential to slow and reduce the spread of COVID-19, they have also brought to light data privacy and security concerns, which pose challenges to their overall use and efficacy. Congress should enact legislation to protect consumer data...
2020Technology Law

Curbing Widespread Discrimination by Artificial Intelligence Hiring Tools: An Ex Ante Solution

Bradfield E. A. Biggers Artificial intelligence (AI) acolytes insist AI will pave the way for idealistic workplace hiring. Their idea is that AI can circumvent common human frailties, such as prejudices and narrow-mindedness, to achieve social and economic equality. Yet inherent biases permeating into AI algorithms stifle society’s goal of promoting equality in the workplace. Despite a growing awareness of AI’s potential for prejudice, politicians are slow to support substantial legislation regulating AI. Nevertheless, the judiciary will inevitably be tasked with addressing discrimination by AI technologies through an unprecedented construction of Title VII of the Civil Rights Act of 1964....
2020Technology Law

Applied Natural Language Processing for Law Practice

Brian S. Haney Scholars, lawyers, and commentators are predicting the end of the legal profession, citing specific examples of artificial intelligence (AI) systems out-performing lawyers in certain legal tasks. Yet, technology’s role in the practice of law is nothing new. The Internet, email, and databases like Westlaw and Lexis have been altering legal practice for decades. Despite technology’s evolution across other industries, in many ways the practice of law remains static in its essential functions. The dynamics of legal technology are defined by the organization and quality of data, rather than innovation. This Article explores the state of the art...
2020Copyright

Google v. Oracle: Weighing Fair Use Factors in Software Copyright Infringement Cases

Guodong Fu The ongoing battle for clarity on the limitation of United States copyright protection in the software industry has yielded inconsistent results over the past ten years. Google LLC v. Oracle America, Inc., currently before the Supreme Court, may finally shed some light on the status of copyright protection as applied to software. In deciding the case, the Court must balance the four fair use factors as applied to software copyrights. The Court will likely navigate a fine line to balance maintaining a market of interoperability with fair competition. This Essay argues that the Supreme Court should maintain a...
2020Copyright

The Internet of Things: How Digital Copyright Rules Govern Our Physical World

Jessica Barbaria Intellectual property law governs the digital world. Thus, copyright law controls how digital content, such as software, is shared and accessed. Digital content is generally licensed, permitting users to save and use a copy of software but not to own it outright. Because the internet enables monitoring of these licenses, copyright holders can ensure users do not infringe on copyright or violate their license agreements in other ways. Software also enables advanced capabilities in physical products. For example, car manufactures can remotely modify settings to benefit drivers after they buy their cars. That said, software updates come with...
2020Copyright

Deep Fakes Accountability Act: Overbroad and Ineffective

Zachary Schapiro Improvements in technology have made it easy to create deep fakes: realistic false digital records depicting a person performing actions that did not occur. Although there are legitimate uses for deep fakes, like parodies or finishing a movie where a principal performer has died, they can inflict harm upon the individual depicted or the general public if, for example, used to influence the outcome of an election. Considering these detrimental uses, Congress has proposed the Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act of 2019 (DEEP FAKES Act) to impose civil...
2020Technology Law

Hackback to the Drawing Board: Ambiguity and Risk in the Active Cyber Defense Certainty Act

Robert Andrea Cyber criminals, both state-sponsored and unaffiliated, are targeting private corporations and individuals more frequently. For several years, there have been calls for legislation that would allow private entities to defend themselves in cyberspace by “hacking back” against their attackers. The Active Cyber Defense Certainty Act is a recent proposal to amend the Computer Fraud and Abuse Act to permit private entities to take active defensive measures without exposing themselves to criminal liability. Although a well-intentioned proposal, the bill uses vague language to identify when, and against whom, private entities can take defensive measures. Enabling private entities to begin...
2020Technology Law

Keeping Private Messages Private: End-to-End Encryption on Social Media

Steven Song Following recent data scandals, online users have become concerned that their private information on the Internet is susceptible to misappropriation. These concerns motivated data privacy regulations such as the General Data Protection Regulation and the California Consumer Privacy Act to ensure better protection against unauthorized access to personal data. Relatedly, Facebook has announced a plan to implement end- to-end encryption (E2EE) for all of its social media messaging systems. E2EE strictly limits access to private messages to the communicating parties. Even the company managing the messaging system cannot access these encrypted conversations. The implementation of E2EE, however, comes...
2020Technology Law

Neural Interfaces and Privacy Law: In Search of a Mind Meld

Alyson Tseng Neural interfaces are electronic devices that are placed on the brain and other parts of the neural system and can collect biometric and neurometric data. Rapid developments and commercialization of neural interfaces in the non-medical realm raise concernsregarding data privacy. The major privacy risks created by neural interfaces demonstrate the need for a sufficient regulatory framework that can adequately govern new technologies. Current laws are insufficient to regulate neural interfaces. This Essay proposes changes that a United States data protection law could adopt. It also encourages companies to consider digital ethics in the design of new technologies. Read...
2020Technology Law

The Case for the Use of Facial Recognition Technology

Ye-Eun Sung Consumers often unknowingly enter brick-and-mortar stores that utilize facial recognition technology. Many are, therefore, at risk of their biometric data being wrongfully used without their consent or knowledge. The delay in the courts’ and the federal government’s response to facial recognition technology has allowed its development and use to remain unregulated. Although regulation of this technology is essential, its use should not be banned outright. Due to the changing retail landscape, facial recognition technology provides brick-and-mortar stores with information that allows them to remain relevant in a market that relies significantly on the internet and e-commerce. Read Full...