Forensic Evidence and Rule 3.8: What Does the Use of Bite Mark Evidence Tell Us About Prosecutorial Ethics?

By: Brendan Clemente Rule 3.8 of the ABA’s Model Rules of Professional Conduct should include rules that specifically address unethical uses of forensic evidence in criminal prosecutions. Forensic evidence is common in criminal trials. But the traditional rules of ethics do not effectively address the use of forensic evidence. Rule 3.8 should include a rule requiring prompt and full disclosure of information about expert witnesses whom the prosecutor plans to call and all relevant information that the prosecutor knows about a forensic method’s application in the case. Rule 3.8 should also include a requirement that the prosecutor use reasonable diligence to learn about a forensic method and possess a good faith belief that the method’s application in the case will be reliable before introducing the evidence at trial. Download Full Article (PDF) Cite: 22 Duke L. & Tech. Rev. 1

Causation and Conception in American Inventorship

By: Dan L. Burk Increasing use of machine learning or “artificial intelligence” (AI) software systems in technical innovation has led some to speculate that perhaps machines might be considered inventors under patent law. While U.S. patent doctrine decisively precludes such a bizarre and counterproductive result, the speculation leads to a more fruitful inquiry about the role of causation in the law of inventorship. U.S. law has almost entirely disregarded causation in determining inventorship, with very few exceptions, some of which are surprising. In this essay, I examine those exceptions to inventive causality, the role they play in determining inventorship, and their effect in excluding consideration of mechanical inventors under current law. Download Full Article (PDF) Cite: 20 Duke L. & Tech. Rev. 116

Purpose or Profit?: The Rise of Public Benefit Corporations in the Technology Industry

By: Alanna Potter Over the last several years, the demand for socially responsible companies has exploded. Many states have responded to this demand by offering a new corporate form, the public benefit corporation (“PBC”), which arguably allows companies to prioritize social benefit in a way that traditional corporations cannot. The technology industry has adopted the PBC structure at higher rates than corporations in other industries. This Note offers reasons for the appeal of PBCs to corporations generally and to the technology sector in particular. This Note also explores why technology companies may be able to achieve the goals discussed without the need for PBCs. Download Full Article (PDF) Cite: 20 Duke L. & Tech. Rev. 90

A Fresh Start: Surveillance Tech and the Modern Law Firm

By: Titus R. Willis The legal community is rapidly evolving: firms are more beholden to clients than ever, associates are growing more competitive with one another, and younger firm employees are more willing than ever to subject themselves to surveillance from their employers. These evolutions come alongside a boom in surveillance technology. Tech companies now provide services that can track every keystroke a lawyer makes on a company computer, analyze the content of their computer screens, or even develop algorithms to measure employee productivity. How does the modern law firm respond to these new technologies? How do they weigh their obligations to clients with the privacy considerations of their employees? This Note examines these key questions and makes a comment about the honor of the legal profession along the way. Download Full Article (PDF) Cite: 19 Duke L. & Tech. Rev. 75

Crashed Software: Assessing Product Liability for Software Defects in Automated Vehicles

By: Sunghyo Kim Automated vehicles will not only redefine the role of drivers, but also present new challenges in assessing product liability. In light of the increased risks of software defects in automated vehicles, this Note will review the current legal and regulatory framework related to product liability and assess the challenges in addressing on-board software defects and cybersecurity breaches from both the consumer and manufacturer perspective. While manufacturers are expected to assume more responsibility for accidents as vehicles become fully automated, it can be difficult to determine the scope of liability regarding unexpected software defects. On the other hand, consumers face new challenges in bringing product liability claims against manufacturers and developers. Download Full Article (PDF) Cite: 16 Duke L. & Tech. Rev. 300

These Walls Can Talk! Securing Digital Privacy in the Smart Home Under the Fourth Amendment

By: Stefan Ducich Privacy law in the United States has not kept pace with the realities of technological development, nor the growing reliance on the Internet of Things (IoT). As of now, the law has not adequately secured the “smart” home from intrusion by the state, and the Supreme Court further eroded digital privacy by conflating the common law concepts of trespass and exclusion in United States v. Jones. This article argues that the Court must correct this misstep by explicitly recognizing the method by which the Founding Fathers sought to “secure” houses and effects under the Fourth Amendment. Namely, the Court must reject its overly narrow trespass approach in lieu of the more appropriate right to exclude. This will better account for twenty-first century surveillance capabilities and properly constrain the state. Moreover, an exclusion framework will bolster the reasonable expectation of digital privacy by presuming an objective unreasonableness in any warrantless penetration by the state into the smart home. Download Full Article (PDF) Cite: 16 Duke L. & Tech. Rev. 278

Live Sports Virtual Reality Broadcasts: Copyright and Other Protections

By: Marie Hopkins As virtual reality rapidly progresses, broadcasts are able to increasingly mimic the experience of actually attending a game. As the technology advances and the viewer can freely move about the game and virtual reality can simulate the in-stadium attendance, the virtual reality broadcast nears the point where the broadcast is indistinguishable from the underlying game. Thus, novel copyright protection issues arise regarding the ability to protect the experience through copyright. Although normal broadcasts may be copyrighted, virtual reality broadcasts of live sports could lack protection under the Copyright Act because the elements of originality, authorship, and fixation are harder to satisfy for this type of work. If the elements that formerly protected broadcasts through copyright no longer apply, the virtual reality broadcast of the game will lose copyright protection. The virtual reality broadcaster can receive protection for the work in several ways, such as (1) by broadcaster-made modifications to the transmitted broadcast, (2) through misappropriation claims, or (3) by inserting contract terms. These additional steps maintain the ability of virtual reality broadcasters to disseminate works without fear the work will not be protectable by the law. Download Full Article (PDF) Cite: 16 Duke L. & Tech. Rev.

Peeling Back the Student Privacy Pledge

By: Alexi Pfeffer-Gillett Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection. Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. Since its introduction in 2014, over 300 companies have signed on, indicating widespread commitment to the Pledge’s seemingly broad protections for student privacy. This industry participation is encouraging, but the Pledge does not contain any meaningful oversight or enforcement provisions. This Article analyzes whether signatory companies are actually complying with the Pledge rather than just paying lip service to its goals. By looking to the privacy policies and terms of service of a sample of the Pledge’s signatories, I conclude that noncompliance may be a significant and prevalent issue. Consumers of education software have some power to