Tag: technology

2020Copyright

Deep Fakes Accountability Act: Overbroad and Ineffective

Zachary Schapiro Improvements in technology have made it easy to create deep fakes: realistic false digital records depicting a person performing actions that did not occur. Although there are legitimate uses for deep fakes, like parodies or finishing a movie where a principal performer has died, they can inflict harm upon the individual depicted or the general public if, for example, used to influence the outcome of an election. Considering these detrimental uses, Congress has proposed the Defending Each and Every Person from False Appearances by Keeping Exploitation Subject to Accountability Act of 2019 (DEEP FAKES Act) to impose civil...
2020Technology Law

Hackback to the Drawing Board: Ambiguity and Risk in the Active Cyber Defense Certainty Act

Robert Andrea Cyber criminals, both state-sponsored and unaffiliated, are targeting private corporations and individuals more frequently. For several years, there have been calls for legislation that would allow private entities to defend themselves in cyberspace by “hacking back” against their attackers. The Active Cyber Defense Certainty Act is a recent proposal to amend the Computer Fraud and Abuse Act to permit private entities to take active defensive measures without exposing themselves to criminal liability. Although a well-intentioned proposal, the bill uses vague language to identify when, and against whom, private entities can take defensive measures. Enabling private entities to begin...
2020Technology Law

Keeping Private Messages Private: End-to-End Encryption on Social Media

Steven Song Following recent data scandals, online users have become concerned that their private information on the Internet is susceptible to misappropriation. These concerns motivated data privacy regulations such as the General Data Protection Regulation and the California Consumer Privacy Act to ensure better protection against unauthorized access to personal data. Relatedly, Facebook has announced a plan to implement end- to-end encryption (E2EE) for all of its social media messaging systems. E2EE strictly limits access to private messages to the communicating parties. Even the company managing the messaging system cannot access these encrypted conversations. The implementation of E2EE, however, comes...
2020Technology Law

Neural Interfaces and Privacy Law: In Search of a Mind Meld

Alyson Tseng Neural interfaces are electronic devices that are placed on the brain and other parts of the neural system and can collect biometric and neurometric data. Rapid developments and commercialization of neural interfaces in the non-medical realm raise concernsregarding data privacy. The major privacy risks created by neural interfaces demonstrate the need for a sufficient regulatory framework that can adequately govern new technologies. Current laws are insufficient to regulate neural interfaces. This Essay proposes changes that a United States data protection law could adopt. It also encourages companies to consider digital ethics in the design of new technologies. Read...
2020Technology Law

The Case for the Use of Facial Recognition Technology

Ye-Eun Sung Consumers often unknowingly enter brick-and-mortar stores that utilize facial recognition technology. Many are, therefore, at risk of their biometric data being wrongfully used without their consent or knowledge. The delay in the courts’ and the federal government’s response to facial recognition technology has allowed its development and use to remain unregulated. Although regulation of this technology is essential, its use should not be banned outright. Due to the changing retail landscape, facial recognition technology provides brick-and-mortar stores with information that allows them to remain relevant in a market that relies significantly on the internet and e-commerce. Read Full...
2019Technology Law

Apple Bites Back: An Antitrust Analysis of Qualcomm’s Licensing Practices

Marie Weisfeiler Both Apple and the Federal Trade Commission filed lawsuits against Qualcomm alleging antitrust violations. Specifically, both alleged that Qualcomm used its monopoly power to engage in unfair licensing practices and create an exclusive deal with Apple, in violation of its industry commitment to use fair practices in licensing its patents. This essay compares Qualcomm’s practices to those of Microsoft in 1998, which, because of Microsoft’s restrictive licensing and exclusive deals, were deemed to have violated the Sherman Act. It then considers the implications for licensing, technology, and antitrust law if a similar case is litigated in the future....
2019Technology Law

Protect Your Own Data: Interactive Streaming Narratives and Data Privacy Concerns

Sabra Paige Hopkins Black Mirror: Bandersnatch exemplifies the value of data gathered from interactive streaming narratives. Netflix can utilize its wealth of subscriber data to push targeted product placements to subscribers based on their demographic data. Data on subscriber choices could also be used to increase the accuracy of Netflix’s recommendation algorithm. In the wake of data privacy regulations, companies must justify their data collection and processing practices. Read Full Text Here
2018Healthcare LawTechnology Law

Get Out of My Head: An Examination of Potential Brain-Computer Interface Data Privacy Concerns

Kevin Y. Li Brain-computer interfaces (“BCI”), which interpret brain impulses and translate them into real world outputs, currently exist in a variety of forms. With the continued development of BCIs and their increasing complexity, privacy issues will arise in regards to the data that they collect. Existing federal statutes, such as HIPAA, as well as state data privacy statutes offer some protection to BCI users, but it remains to be seen whether these laws will be sufficient to accommodate the amount and sensitivity of the data likely to be generated by future BCIs. Lastly, this article explores the possibility of...
2018Patent

IP Protection for Startups: The Role of Legislation in Stopping Patent Trolls and Encouraging Innovation

Kristin Garr In the past five years, the rate of startups entering the market has drastically increased, and it continues to see an upward trend, giving rise to the phenomenon known as the “startup boom.” While the United States Patent and Trademark Office (“USPTO”) has implemented major changes to the patent system in the past decade, the agency has not been able to address the problem that is crippling the success of emerging companies: patent trolls. Various states’ legislatures have recognized this issue and enacted statutes prohibiting bad faith patent assertions as a result. This article explains the startup industry’s...
2018Copyright

Blockchain and Copyright: Vain Hope for Photographers?

Jason Kim Blockchain technology has near unlimited application potential, and its influence could extend all the way to the copyright industry. For photographers, blockchain technology might serve as a safe and efficient tool to detect infringement. However, this notion must be treated with caution. Blockchain’s security applications are indeed a valuable prospect, but the technology has critical flaws that prevent it from becoming the panacea for photographer. Read Full Text Here