The Digitization of the Carceral State: The Troubling Narrative Around Police Usage Of Facial Recognition Technology

The Digitization of the Carceral State: The Troubling Narrative Around Police Usage Of Facial Recognition Technology Sara E. Yates[1]* Print Version: The Digitization of the Carceral State- The Troubling Narrative Around Police Usage Of Facial Recognition Technology The technological veil conceals the reproduction of inequality and enslavement. -Herbert Marcuse[2] This Note applies a racial social control frame to the problem of facial recognition technology (FRT), showing how this technology may entrench preexisting inequalities and disparate treatment of people of color by law enforcement. Police usage Continue reading →

Regulating the Social Puppeteers: § 230 & Marginalized Speech

Regulating the Social Puppeteers: § 230 & Marginalized Speech Kylie Thompson[1]* Print Version: Regulating the Social Puppeteers- § 230 & Marginalized Speech   Introduction 462 I. What is § 230? 465 A. Legislative History 465 B. Expansive Scope 466 C. Threading the § 230 needle 468 II. The Power of Social Platforms 471 A. Harassment & Disinformation 471 B. Content Moderation Practices 474 C. Whose Content is it Anyway? 477 III. Reforming § 230 478 Conclusion 481 This paper addresses social platforms’ immunity under § 230 Continue reading →

Personal Information and Artificial Intelligence: Website Scraping and the California Consumer Privacy Act

Personal Information and Artificial Intelligence: Website Scraping and the California Consumer Privacy Act Brian Stuenkel[1]* Print Version: Personal Information and Artificial Intelligence- Website Scraping and the California Consumer Privacy Act This note presents a hypothetical in which an upstart technology firm scrapes public-facing webpages and websites, scooping up individuals’ personal identifying information (PII) including names, addresses, phone numbers, and dates of birth (among other information) in the process. In this hypothetical scenario, the tech firm then uses the information gathered to create a dataset containing the Continue reading →

Airline Commercial Use of EU Personal Data in the Context of the GDPR, British Airways and Schrems II

Airline Commercial Use of EU Personal Data in the Context of the GDPR, British Airways and Schrems II W. Gregory Voss[1]* Print Version: Airline Commercial Use of EU Personal Data in the Context of the GDPR, British Airways and Schrems II In July 2019, shortly after the end of the first year of application of the EU General Data Protection Regulation (GDPR), the UK’s data protection regulator announced its intention to fine British Airways £183 million under the GDPR in connection with a data breach. Continue reading →

A Textualist Interpretation of the Visual Artists Rights Act of 1990

A Textualist Interpretation of the Visual Artists Rights Act of 1990 Brian L. Frye[1]* Print Version: A Textualist Interpretation of the Visual Artists Rights Act of 1990 Philosophy may not interfere with the actual use of language, it can only describe it. —Ludwig Wittgenstein[2] For numberless generations, jurisprudes waged total war in the conflict among textualism, intentionalism, and purposivism.[3] Textualists insisted that courts must interpret statutes based on the meaning of their text, intentionalists insisted on the intention of the legislature, and purposivists insisted on Continue reading →

You Can’t Be Serious: Problems of Facticity and ‘Plausible Nonliteral Assertions’ in U.S. Defamation Law

You Can’t Be Serious: Problems of Facticity and ‘Plausible Nonliteral Assertions’ in U.S. Defamation Law Emily Erickson[1]* Matthew D. Bunker** Print Version: YOU CAN’T BE SERIOUS- PROBLEMS OF FACTICITY AND ‘PLAUSIBLE NONLITERAL ASSERTIONS’ IN U.S. DEFAMATION LAW   Introduction 343 I. Roots of the Protection for Opinion, Rhetorical Hyperbole, and Satire 346 II. PNAs in the Courts 352 III. Constructing the Appropriate Audience 357 Analysis and Conclusion 360 Introduction In a scene from the 2013 film American Hustle,[2] 1970s con artist Irving Rosenfeld (played by Continue reading →

Hacking Antitrust: Competition Policy and the Computer Fraud and Abuse Act

Hacking Antitrust: Competition Policy and the Computer Fraud and Abuse Act Charles Duan[1]* Print Version: Hacking Antitrust- Competition Policy and the Computer Fraud and Abuse Act The Computer Fraud and Abuse Act, a federal computer trespass statute that prohibits accessing a computer “without authorization or exceeding authorized access,” has often been criticized for clashing with online norms, over-criminalizing common behavior, and infringing freedom-of-expression interests. These controversies over the CFAA have raised difficult questions about how the statute is to be interpreted, with courts of appeals Continue reading →