AI washing occurs when companies claim to be using artificial intelligence (AI) technology to enhance their services, but in fact are not. In March of 2024, two investment advisors paid $400,000 in civil penalties “for making false and...
technology
algorithm
An algorithm is a set of rules or a computational procedure that is typically used to solve a specific problem. In the case of Vidillion, Inc. v. Pixalate Inc. an algorithm is defined as “one or more process(es), set of rules, or methodology...
artificial intelligence (AI)
According to 15 U.S. Code § 9401 artificial intelligence is defined as “a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations or decisions influencing real or virtual environments.”...
blog
A blog–short for weblog–is a website where one or more writers (called bloggers) share their personal insights in news articles or journal-like entries. Blog entries–also called blog posts–can contain text alone or include photos, videos, or...
Child Online Privacy Act
The Child Online Privacy Act concerns internet privacy for children. It was passed in 1998 and codified at 15 U.S.C. § 6501-6506. The law is enforced by the Federal Trade Commission, applying the regulations recorded at 16 C.F.R. § 312....
Commerce Control List
In the interest of U.S. national security, the Department of Commerce's Bureau of Industry and Security (BIS) is responsible for implementing and enforcing the Export Administration Regulations (EAR), which regulate the export and re-export...
communications
Communications law is primarily related to the regulation of computer telecommunications, cable, internet, as well as radio and television broadcasting. The federal government has largely governed broadcasting because by its nature,...
computer and internet fraud
Computer and internet fraud entails the criminal use of a computer or the Internet and can take many different forms. While some argue that “hacking” is a neutral term (see United States v. Thompson (2022)) illegal hacking is when a...
Computer Maintenance Competition Assurance Act
Title III of the Digital Millennium Copyright Act, the Computer Maintenance Competition Assurance Act, broadened Section 117 of the Copyright Act to allow third-party maintenance organizations to used software licensed to a computer’s owner or lessee...
cookie
A cookie is data created by an internet server while browsing a website that is sent to a web browser. The browser stores the information in a text file, and re-sends that information to the server each time the browser accesses the server....