On February 28th, student attorneys Andi Wilt and Sean Doran and TLPC Director Blake Reid delivered a webinar on best practices for public library makerspaces hosted by the Colorado State Library Association.
The webinar focused on addressing problems and concerns that arise when a public space like a library provides access to 3D printing technology. 3D printers present challenges to libraries stemming from objects that may infringe intellectual property rights or raise other concerns under library policies.
The best way for libraries and other public makerspaces to mitigate against these risks may be to set up a positive agenda, training, and programming for the use of the space. For example, libraries should provide education and training of design technologies that work with 3D printers. Programs like Tinkercad are now free and easy to use, and many of them offer free training programs. Webinar attendees contributed a variety of helpful best practices that have worked in libraries across the country.
The webinar was recorded and archived by the CSLA and can be viewed anytime along with links to various resources and best practice ideas.
(by Ben Epel, Colorado Law 2L)
The world is facing a new problem when it comes to innovation: automation and robots increasingly have been replacing individual workers. Robots have moved out of the factories and will soon be coming to a fast food restaurant near you; in 2016, McDonald’s former CEO Ed Rensi said that it is cheaper to buy a $35,000 robotic arm than it is to hire an employee who makes $15 an hour bagging French fries. As robots become cheaper and the need for higher wages increases, what will happen to displaced employees?
What would Bill Gates do? A robot tax. Private companies would be taxed whenever the company replaces an individual with a robot. Gates claims that the government should implement this tax to slow down the rate of automation in the United States. Continue reading “Last Week in Tech Policy: #46 Is Taxing Robots Really the Answer?”
(By Gabrielle Daley, Colorado Law 2L)
NASA scientist and U.S citizen Sidd Bikkannavar flew back into the United States on January 30th, 2017 and was detained by U.S customs and border patrol agents. Mr. Bikkannavar was detained upon his arrival at the Houston airport by agents who stated the reason for the detention was to ensure that he was not bringing anything dangerous into the country. However the agents never searched Mr. Bikkannavar’s luggage. Instead he was handed a document entitled “Inspection of Electronic Devices” and asked for his cell phone and cell phone password.
Mr. Bikkannavar was reluctant to hand over the phone because as it belonged to his employer, the NASA Jet Propulsion Laboratories. However, agents insisted on access to the phone and password, and eventually Mr. Bikkannavar gave an agent both. The agent then left the room with the device. Mr. Bikkannavar has no idea what the agent did with the phone outside of his presence, but in a Tweet last week confirmed that JPL is running digital forensics on the phone to try and determine what may have been taken—or left—on the phone.
Continue reading “Last Week in Tech Policy: #45 Inspection of Electronic Devices and Passwords”
Working with Silicon Flatirons Senior Fellow Pierre de Vries, TLPC student attorneys Andrew Manley and Jonathan Bair endorse prior recommendations that the Federal Communications Commission improve its waiver application process for radio operations through the adoption of Risk-Informed Interference Assessment (RIA). The TLPC and de Vries submitted a filing to the Commission suggesting how RIA might be adopted as a tool to assist the Commission in its decision making process. The filing elaborates on the RIA method, offers a checklist by which the Commission can request RIA from parties, and explores three test waivers for the application of RIA.
(by Jodi Wallace, Colorado Law 2L)
On July 20, 1969, Neil Armstrong proclaimed, “That’s one small step for a man, one giant leap for mankind.” Buzz Aldrin followed, describing the moon’s surface with the words “magnificent desolation.” For a few short hours, the two men explored the lunar surface, gathered samples, and then climbed back aboard the lunar modular to come back to Earth.
47 years after Apollo 11 was launched to take the first astronauts to the moon, Elon Musk (chief executive of SpaceX) has announced his plans to create a permanent human settlement on the surface of Mars. But Elon Musk is not alone in this ambition—his announcement is only the most recent, and perhaps the broadest in scope.
Continue reading “Last Week in Tech Law & Policy, Vol. 38: Colonizing Mars—Fact or Fantasy?”
(By Sean Doran, Colorado Law 3L)
Both major political parties in the United States currently gather and aggregate massive amounts of data on American voters. Over the last several election cycles, with the advent of advanced data analytics and advances in data storage and processing, campaigns have gained the ability to learn and track a surprising amount of data about voters. This creates a level of precision that allows campaigns to build advanced models for identifying and targeting individual voters to receive (or not receive) individual messages (microtargeting). Parties are building “political dossiers” on American voters which are some of the largest, unregulated aggregations of personal data that currently exist.
Continue reading “Last Week in Tech Law & Policy, Vol. 35: Microtargeting and the Use of Voter Data to Win Elections”
(By Max Brennan, Colorado Law 2L)
This week’s blog post examines the concept of algorithm bias. It begins with a definition of algorithm bias, turning to its interactions with the law, some real-world examples of bias, and ends with considerations for future legal treatment of algorithm bias.
Continue reading “Last Week in Tech Law & Policy, Vol. 34: Algorithm Bias, Discrimination, and the Law”
(by Kiki Council, Colorado Law 3L)
Last week’s blog post concerned the ramifications of sponsored and compelled government hacking with the use of backdoor encryption. This week’s post concerns how government hacks of computers using the Tor browser, and whether those hacks are considered a “search” under the Fourth Amendment.
Continue reading “Last Week in Tech Law & Policy, Vol. 32: Is government hacking a “search” under the Fourth Amendment?”
(by Colter Donahue, Colorado Law 3L)
Should government agencies possess, compel, or sponsor hacking and backdoors? A backdoor is a method of bypassing the normal authentication system of a website, messaging service, or other means of electronic communications.
Privacy and encryption advocates point out that the tools created or vulnerabilities exploited by backdoors pose a privacy risk. The vulnerabilities are not not limited to exploit by U.S. agencies like the FBI and NSA; bad actors and other nations can use them too. Hacking tools don’t always stay secret; once exposed, potential damage may be measured on a global scale. But what happens when law enforcement needs access for investigatory purposes? The following post will look at a recent example and the balance of competing interests.
Continue reading “Last Week in Tech Law & Policy, Vol. 31: Sponsored and Compelled Hacking, Government Edition”
(by Parker Ragland, Colorado Law 2L)
People often hold one of two views on privacy—either it is important to them, or they state, “I have nothing to hide.” While the latter response legitimately expresses fear that privacy laws may be used by wrongdoers to shield themselves from justice, it also reveals a common misconception about privacy: only mistakes in your past can harm your future. Problems associated with data science, and specifically the data-broker industry, are at the core of this misconception.
Continue reading “Last Week in Tech Law & Policy, Vol. 29: The Dangers of “Innocuous” Data”