Law of Computer Technology (17-562, 17-662, 17-762) FALL 2024 OFFICIAL COURSE WEB PAGE Tuesdays and
Thursdays 8:00 - 9:20 a.m. Dougherty A302 Course Overview This course is both a survey of computer law and an examination of how courts, juries, and administrative agencies make decisions on issues involving computer technology. It is also a survey of the most important and controversial topics in technology law today. The material is divided into six primary subjects: 1. Legal process: how courts operate, differences between civil and criminal law, who has to obey the determination of a court, over whom a court can exercise power, and regulatory law. No legal background is required or assumed. This is not a law school course. Great effort is expended to keep the syllabus current based on breaking legal events. Therefore, the content and ordering of lectures may vary somewhat as the course progresses. NOTE: It is possible that the instructor may be obliged to testify at one or more trials during the semester. Any missed lectures will be rescheduled or held remotely via Zoom. Which Course Should I Take? All three courses meet in the same place at the same time. They differ only in course length, number of homwork assignments and number of credits awarded. 17-762 is a 12-unit, full-semester course intended for graduate students, particularly those in the MS in Artificial Intelligence and Innovation program and Societal Computing Ph.D. students. 17-562 is a 9-unit, full-semester course intended for undergraduates and graduate students outside of ISR. 17-662 is a 6-unit minicourse offered in Fall Mini 1, consisting of the first 14 lectures. It is required for students in the Privacy Engineering program. The requirement can also be satisfied with 17-562 or 17-762. Almost all students who register for 17-662 eventually switch into 17-562 or 17-762. However, except for MS in Artificial Intelligence and Innovation students, who must take 17-762, any student may register for any version of the course. Everyone in all three courses will take a take-home final examination. The final exam counts for 30% of the grade. There are no midterm exams. Class participation counts for 10%. Homework counts for 60%. There is one mini-homework 0 for everyone, then 4 more homeworks in 17-762, 3 in 17-562 and 2 in 17-662. Instructor Michael I. Shamos, Ph.D., J.D,, is Distinguished Career Professor in the School of Computer Science. Dr. Shamos is an intellectual property attorney admitted to the Pennsylvania Bar and the Bar of the United States Patent and Trademark Office. He has previously taught courses in Intellectual Capital, eCommerce Legal Environment and Internet Law and Regulation for the Tepper School of Business, as well as courses in the Computer Science, Mathematics and Statistics Departments. He was Director of the MSIT in eBusiness Technology in the Institute for Software Research at Carnegie Mellon from 2004-2018. He is now Director of the M.S. in Artificial Intelligence and Innovation. Dr. Shamos is a frequent expert witness in computer copyright, patent and electronic voting cases. No textbook There is no textbook because the materials necessary for this course are very recent and have not yet found their way into textbooks. All of the readings are available on the Internet, and will be posted approximately one month in advance. Readings are to be done BEFORE the associated lecture. PLEASE NOTE: readings for future lectures may change as the course progresses if warranted by significant legal decisions. So read ahead, but not too far ahead. Advice on how to succeed in the course can be found in the Course Handbook.You may find the course glossary useful in understanding legal terminology and abbreviations. Administrative Information The course meets twice a week on Tuesdays and Thursday 8:00-9:20 a.m.in Dougherty Hall A302, possibly occasionally via Zoom. Students are encouraged to work together on the homework assignments. Past experience has shown that students do better when they work in teams. However, after discussing problems and solutions jointly, each student must prepare their own paper individually, without copying material from other people. The final exam will be a take-home over a period of at least 24 hours, date to be determined. It will be open-book, open notes and open Internet. However, unlike with homework, collaboration with others is not permitted during the final exam. Instructor Availability To ask a question or schedule an appointment outside of class, please send email to shamos@cs.cmu.edu. Questions of general interest to the class should be asked in class, not in email or in a private meeting. Grading Policy Written work will not be re-graded except for manifest error. A "manifest error" is one that is immediately apparent from the paper itself, such as failure to grade a question or an arithmetic error in computing a score. HOW TO GET AN "A" IN THIS COURSE Read and follow the advice in the Course Handbook. Course Syllabus
Topic 1 - THE LEGAL PROCESS Reading: Introduction to the Court System (Barclay, 4 pp.) Optional reading:
A Guide to Legal Literacy (California State Bar, 73 pp. -- contains a good glossary) Reading:
A Guide to the Rulemaking Process (Office of the Federal Register,
11 pp.) 3. INTERPRETING STATUTES (Tuesday, Sep. 3, 2024) – Technology advances rapidly, and statutes and legal decisions can't keep up. This means that old laws are constantly being applied to situations not contemplated when the laws were originally passed. This means that a court must interpret the words of a statute in a new context, a process called statutory interpretation. This is not a haphazard process, but is guided by specific rules which, unfortunately, can produce anomalies to be remedied later by the legislature. We will look at interpretation of existing statutes in light of new technology not contemplated when the statutes were passed.. THIS IS THE SINGLE MOST IMPORTANT LECTURE IN THE COURSE. Reading: Statutory
Construction Act, 19 Pa. C.S. §1921 (4 pp.) Optional reading:Joffe
v. Google (9th Cir. Sept. 10, 2013) (35 pp.) 4. JURISDICTION (Thursday, Sep. 5, 2024) – The jurisdiction question is, "when does a court have the power to hear a particular case and bind the parties by its decision"? Jurisdiction is often a key issue in determining whether a lawsuit is brought at all, and where and against whom it is brought. Computer technology, particularly networking and wireless communication, has changed the way courts think about jurisdiction, which has historically been tied to physical presence in a particular state. Reading:
International Shoe Co. v. Washington, 326 U.S. 310 (1945) (6 pp., fundamental U.S. case on personal jurisdiction) Optional Reading:
Daimler AG v. Bauman (Sp. Ct. 2014)
(46 pp. -- Supreme Court case on international
jurisdiction) 5. INTERNET JURISDICTION (Tuesday, Sep. 10, 2024)– The Internet has raised a host of new jurisdictional questions because packets follow unpredictable paths during transmission and might pass through multiple states without the knowledge or intent of the sender. Does each of these states have jurisdiction in a crime or breach of contract occurs as a result of the transmission? If not, which states should have jurisdiction and why? Reading: Zippo
Manufacturing v. Zippo Dot Com Inc., 952 F.Supp. 1119 (W.D. Pa. 1997)
(7 pp.) Optional
Reading: NOTE: there is a lot of content here. Pick one or two
references if you want depth on this topic. Topic 2 - EVIDENCE 6. COMPUTER EVIDENCE (Thursday, Sep. 12, 2024) – All trials involving proving facts. The rules of evidence define which methods can be used to prove facts at trial. Some of these, such as the hearsay rule, are quite complex. Others, which may appear simple, may have their meaning stretched when computers are involved. For example, suppose you dispute that you clicked "I accept" on a license agreement for an Internet download? How does the company prove you did? This lecture concentrates on the use of computer-based evidence in trials. Reading: Federal Rules of Evidence (Articles I, IV, VIII, IX, X)Kerr, Computer Records and the Federal Rules of Evidence (9 pp.) Legal Status of Optical Disk and Electronic Imaging Systems ( 4pp.) Rostoker & Rines, Computer Jurisprudence (15 p. excerpt) Sutherlin v. State of Indiana, 784 N.E.2d 971 (Ind. Ct. App. 2003) (3 pp.) What is hearsay? (short video clip) What is not hearsay? (short video clip) Optional Reading: Chung & Byer, The Electronic Paper Trail (21 pp.) 7. SCIENTIFIC EVIDENCE (Tuesday, Sep. 17, 2024) – Some trials involve opinion evidence. For example, what was the cause of the Minneapolis bridge collapse? Did the software substantially perform according to its manual? Does this technological measure effectively control access to a copyrighted work or not? These are scientific matters not within the skill of either the judge or jury, so must be proven through expert testimony. Who is an expert? How do they qualify? What happens when experts disagree (they always do in a lawsuit)? How can an expert be challenged? When are scientific theories recognized by courts? Reading: Daubert
v. Merrell Dow, 509 U.S. 579 (1993) (14 pp. -- the principal case
on expert qualifications) Optional Reading: Commonwealth
v. Serge, 896 A.2d 1170 (Pa. 2006), cert. den.
(2006) (26 pp.) Topic 3 - EBUSINESS LAW 8. SOFTWARE LICENSES (Thursday, Sep. 19, 2024)– What can you do with software you buy in a store or download from the Internet? What are the conditions under which such software is provided? What is the effect of clicking "I accept" on a license agreement that is too long to read or difficult to find? What about freeware, shareware and open source software? Are shrinkwrap, clickwrap and browsewrap agreements enforceable? Reading:ProCD
v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996) (7 pp.) Optional Reading: Berkson
et al. v. Gogo LLC et al. (S.D.N.Y. April 9, 2015) (83 pages but a very
thorough analysis of mutiple types of software licenses) 9. ELECTRONIC TRANSACTIONS (Tuesday, Sep. 24, 2024) – Ordinary sales transactions in the brick and mortar world are governed by the Uniform Commercial Code, some form of which has been enacted in 49 states. The country has been struggling, though, to develop a consistent statute that applies to electronic transactions, in which the traditional methods of identifying parties and inspecting goods are not available. Two competing statutes are the Uniform Electronic Transactions Act (UETA) and the Uniform Computer Information Transactions Act (UCITA), which we will compare and contrast. Reading: E-Sign
Act (14 pp.) Optional Reading: JBB
Investment Partners v. Fair (Cal. App. 1st Dist., Dec. 5, 2014) (27 pp.) Topic 4 - PERSONAL INTRUSIONS 10. DATA PRIVACY (Thursday, September 26, 2024) – Privacy is well-covered in other ISR courses, so we will just scratch the surface to interest you in further study of the subject. Exactly what is data privacy and why do people want it? We'll look at the patchwork of statutes around the country that emphasize various aspects of data privacy and then console ourselves over the lack of any coherent body of data privacy law in the United States. EU General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), data breach notification. Reading: Optional
Reading (GDPR and CCPA): Overview of the GDPR (44 pp.) 11. DEFAMATION, FREE SPEEECH AND SECTION 230 (Tuesday, Oct. 1, 2024) – With websites, Twitter, Facebook and other social media, everyone is now a publisher and, for that matter, an instant publisher. This has given rise to fake news, doxing, revenge porn and other such acts. There has always been a tension between freedom of speech and one's right not to be defamed or embarrassed through publication of false information (or wrongful revealing of true information). Under the Communications Decency Act (Section 230), when is a website liable for the positings of its subscribers? Because the Internet is a worldwide medium, it is possible to cause great damage in another country without leaving home, and, more important, without subjecting oneself to the jurisdiction of foreign courts. Or is it? Can imprudent social media posts be retracted so they cannot be used against the poster in the future? Is it legal to collect a person's posts and archive them, hoping to use them again the poster in the future? Reading: Bosky, Defamation in the Internet Age Topic 5 - INTELLECTUAL PROPERTY 12. TRADE SECRETS (Thursday, Oct. 3, 2024) – A good rule of thumb is that something is a trade secret if it is secret and relates to trade (really). All fast-moving technological fields, particularly the computer field, are replete with trade secrets. What methods are legitimate to discover a competitor's trade secret? Reverse engineering? What happens if improper methods (theft, bribery) are used? When does a trade secret cease being a trade secret? Reading: Uniform
Trade Secrets Act (3 pp.) Optional Reading:
Syncsort
v. IRI (D. N.J. 2011) (36 pp.) 13. CONFIDENTIALITY AGREEMENTS (Tuesday, Oct. 8, 2024) – Almost every company in the computer industry requires employees to sign confidentiality and non-competition agreements. Exactly what can they require people to sign and what can be enforced in court? Surprisingly, there are vast differences among the states concerning these contracts. Reading:
HP Complaint Against Mark Hurd, filed Sept. 10, 2010 (51 pp. --
only the first 18 are significant) Optional Reading: NEC nondisclosure agreement (5 pp.) 14. DOMAIN NAMES (Thursday, Oct. 10, 2024) – How domain names are assigned and registered. What happens when trademark owners have a dispute over the same name, e.g., someone registers heinz.biz and H.J. Heinz objects? Who wins? (You probably know the answer to that, but what are the rules that apply in less obvious situations?) Domain name trickery: cybersquatting, metatagging, framing and typopiracy. Reading:
Full Sail, Inc. v. Spevak (Case 6:03-cv-887-Orl-31JGG, M.D. Fla., 2003)
(15 pp., the District Court case) OCT. 12-13: 17-662 TAKE-HOME FINAL EXAM FALL BREAK. NO CLASS OCT. 15 OR 17 15. COPYRIGHT (Tuesday, Oct. 22, 2024) Copyright is one of the hottest topics in computer law right now and will occupy us for two weeks. This lecture deals generally with the rights of copyright owners and what is copyrightable and what is not, the policy behind copyright and the relationship between the cost of copying and the tendency to infringe. Reading:
Feist Publications v. Rural Tel. Service Co., 499 U.S. 340 (1991)
(13 pp. -- critical case: the demise of "sweat of the brow" copyright) Optional
Reading:
Copyright and New Technologies
(15 pp.) 16. COPYRIGHT FAIR USE (Thursday, Oct. 24, 2024)– What use can be made of the copyrighted work of others? This is somewhat defined in the United States Code at 17 U.S.C. §107, but court decisions interpreting this section vary widely. We'll talk about sampling, and the safe harbor for ISPs, the Google (YouTube) and Internet Archive cases. Reading: American
Geophysical Union v. Texaco, 60 F3d 195 (2d Cir. 1994) (29 pp. Not
all "research" use is "fair use") Optional Reading:
CoStar Group, Inc. v. LoopNet, Inc., 373 F.3d 544 (4th Cir. 2004)
(26 pp.) 17. COPYRIGHT IN COMPUTER PROGRAMS (Tuesday, Oct. 29, 2024) – Computer programs contain both human expression and utilitarian components; that is, they do not merely express concepts but serve as instructions to real machines to perform useful functions. There has always been tension as to whether computer programs ought to be copyrightable at all, since some believe that granting a copyright on a program is effectively conferring a long-term patent on technology that probably has a short lifetime. This tension has given rise to a great deal of litigation and now almost every software copyright case filed meets with a defense that the program was not copyrightable in the first place. We will explore the limits of what is copyrightable and what is not. Abstraction-filtration-comparison. The Lotus v. Borland and Lexmark cases. Are APIs copyrightable? Oracle v. Google. Reading: Copyright
Infringement of Computer Software (3 pp.) Optional Reading: The "Abstraction, Filtration, Comparison Test" (Ladas & Perry
LLP) (4 pp.) 18. DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA) (Thursday, Oct. 31, 2024) – The session is devoted to the extremely controversial statute the "Digital Millennium Copyright Act" (17. U.S.C. §1201ff), which fundamentally makes it a crime to circumvent various forms of data and software protection, such as breaking copy protection or encryption on files to allow them to be copied. Reading: A&M
Records v. Napster, 114 F.Supp.2d 896 (N.D. Cal. 2000), aff’d 239
F.3d 1004 (9th Cir. 2001, 16 pp.), aff’d
after remand, 284 F.3d 1091 (9th Cir. 2002) (56 pp., skim for ideas) NOV. 4. DEMOCRACY DAY (ALSO KNOWN AS ELECTION DAY). NO CLASS. PLEASE VOTE IF YOU ARE ELIGIBLE. 19. PATENTS (Thursday, Nov. 7, 2024) – Huge amounts of money can be awarded in patent cases, e.g. hundreds of millions of dollars or more. What is a patent? The tests for patentability: novelty, usefulness and non-obviousness. What is obvious and who decides? The patent examining process. What are the parts of a patent and what constitutes infringement? Reading: An
Overview of the US Patent System (6 pp.) 20. SOFTWARE PATENTS (Tuesday, Nov. 12, 2024) – A huge number of software patents are now being issued, at the rate of hundreds per week. They have produced a great deal of litigation and consternation in the software industry. We will look at what is patentable about software and algorithms and examine some the challenges being brought against software patents. Reading: Alice
Corporation Pty. Ltd. v. CLS Bank International et al. (Sup. Ct.
2014) (21 pp.) 21. PATENT LITIGATION: MIRROR WORLDS V. APPLE, APPLE V. SAMSUNG (Thursday, Nov. 14, 2024) – In October, 2010, a small company called Mirror Worlds won a jury award of $625,000,000 against Apple Computer for patent infringement (later vacated). Mirror Worlds claimed that its patents were infringed by Apple's iPhone user interface. In August, 2012, Apple won over $1 billion against Samsung for infringement of its patents on the iPhone user interface. We will study these cases in detail, including various decisions made by the courts and the juries. Reading:
Complaint in Mirror Worlds v. Apple (7 pp.) Topic 6 - GOVERNMENT REGULATION 22. AI AND ROBOTICS LAW, AI AGENTS (Tuesday, Nov. 19, 2024) – How is society to deal with intelligent systems that behave in ways not anticipated by their creators, but which can injure people? What is a robot legally? What is artificial intelligence legally? How is society to deal with intelligent systems that can create other intelligent systems? Can such systems be legally regulated and controlled? We will look at current attempts to assign liability in such instances, including in robotics, autonomous vehicles and unmanned aircraft system (UAS: drones).
23. GENERATIVE AI (Thursday, Nov. 21, 2024) – Generative AI has changed the world, including the legal world. The reality that computer program can create in ways previously thought only possible by humans has shaken the underpinning of the law in mutliple domains, including, patent, copyright, evidence (deepfakes), negligence, defamation, data privacy and surveillance, and has prompted efforts to regulate the new technology. 24. NET NEUTRALITY AND GOVERNMENT REGULATION OF THE INTERNET (Tuesday, Nov. 26, 2024) – "Net neutrality" is the principle that service providers and carriers shoul treat all Internet packets equally, regardless of source, destination, size or content. It conflicts with free market forces and also has antitrust implications. We will look at how governments, both U.S. and others, can force carriers to be net neutral. Reading: Radia & Melugin, Net Neutrality Primer (9 pp.) Optional Reading: FCC Notice of Proposed Rulemaking (Apr. 27, 2017)U.S. Telecom Association v. FCC (No. 15-603, D.C. Cir. May 1, 2017) 109 pp. EU Net Neutrality Policy and the Mobile Sector (33 pp., Alexiadis) NOV. 28 IS THANKSGIVING DAY. NO CLASS 25. TECHNOLOGICAL ANTITRUST (Tuesday, Dec. 3, 2024) – Computer technology has engendered previously unheard-of methods of stifling competition, for example, by disabling a computer's ability to install or use a competitor's software. Naturally such behavior has antitrust implications, so we will look at applicable antitrust law. Billions in fine have been levied against Google, but what exactly did it do that was illegal?
Reading:
Google's Smartphone Patents (3 pp., NY Times, October 10, 2012) Optional Reading: Ticketmaster
v. RMG Technologies (C.D. Cal. Oct. 16, 2007) (32 pp.) 26. COMPUTER CRIME (Thursday, Dec. 5, 2024) – Computers have provided unparalleled tools for the commission of crime and offer equally unparalleled methods of avoiding detection. Because so many businesses are completely dependent on computers, servers have become a target for extortion attempts,
competitive attacks, theft of trade secrets and hacking with a variety of objectives, some as simple as publicizing causes. The U.S. has been slow to cope with advancements in computer crime because of a fundamental principle of criminal law: crime statutes are strictly construed. Simply stated, this means that an act is not a crime unless a statute makes it explicitly criminal. There are no "common law" computer crimes. With legislatures slow to draft laws to keep pace with criminals, there is a continuing gap between what is legal and what should be illegal. The first lecture will
deal with computers as instruments of crime. Computer Fraud and Abuse Act, crimes against computer systems: denial of service attacks, vandalism, cyberterrorism. Reading:Computer
Fraud and Abuse Act (6 pp.) Optional Reading: Hageseth
v. Superior Court of San Mateo County, Cal. App. (1st Dist., May 21,
2007) (37 pp., unusual case in which a court is sued) DECEMBER 9-10 TAKE-HOME FINAL. IT WILL BE AVAILABLE AT 9:00 AM ON DECEMBER 9 AND IS DUE AT 9:00 PM ON DECEMBER 10. |
|