technology

algorithm

An algorithm is a set of rules or a computational procedure that is typically used to solve a specific problem. In the case of Vidillion, Inc. v. Pixalate Inc. an algorithm is defined as “one or more process(es), set of rules, or methodology...

artificial intelligence (AI)

According to 15 U.S. Code § 9401 artificial intelligence is defined as “a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations or decisions influencing real or virtual environments.”...

blog

A blog–short for weblog–is a website where one or more writers (called bloggers) share their personal insights in news articles or journal-like entries. Blog entries–also called blog posts–can contain text alone or include photos, videos, or...

Child Online Privacy Act

The Child Online Privacy Act concerns internet privacy for children. It was passed in 1998 and codified at 15 U.S.C. § 6501-6506. The law is enforced by the Federal Trade Commission, applying the regulations recorded at 16 C.F.R. § 312....

Commerce Control List

In the interest of U.S. national security, the Department of Commerce's Bureau of Industry and Security (BIS) is responsible for implementing and enforcing the Export Administration Regulations (EAR), which regulate the export and re-export...

communications

Communications law is primarily related to the regulation of computer telecommunications, cable, internet, as well as radio and television broadcasting. The federal government has largely governed broadcasting because by its nature,...

computer and internet fraud

Computer and internet fraud entails the criminal use of a computer or the Internet and can take many different forms. While some argue that “hacking” is a neutral term (see United States v. Thompson (2022)) illegal hacking is when a...

Computer Maintenance Competition Assurance Act

Title III of the Digital Millennium Copyright Act, the Computer Maintenance Competition Assurance Act, broadened Section 117 of the Copyright Act to allow third-party maintenance organizations to used software licensed to a computer’s owner or lessee...

cookie

A cookie is data created by an internet server while browsing a website that is sent to a web browser. The browser stores the information in a text file, and re-sends that information to the server each time the browser accesses the server....

credit card fraud

Credit card fraud is a form of identity theft that involves an unauthorized taking of another’s credit card information for the purpose of charging purchases to the account or removing funds from it. Federal law, by way of 15 U.S.C. §1643,...

Pages