False citations: AI and ‘hallucination’
Adrian Aronsson-Storrier and Helen Hart look at the recent case of Harber, a tax case involving fictitious case references generated by ChatGPT…
Adrian Aronsson-Storrier and Helen Hart look at the recent case of Harber, a tax case involving fictitious case references generated by ChatGPT…
The Computer Misuse Act 1990 is intended to protect the integrity and security of computer systems and data through criminalising access to them that has not been authorised by the owner of the system or data….
Read More… from What lies ahead in 2024 for the reform of the Computer Misuse Act?
Louise Hooper, of Garden Court Chambers, highlights how the existing human rights framework can be put to good use in the regulation of technology. Adapted from her talk at the SCL Annual Conference….
Read More… from Human Rights and Technology: The harms behind the hype?
Ben Evans takes a critical look at recent UK and EU developments in Amazon’s acquisition of iRobot….
Read More… from Amazon/iRobot: does the European Commission have an ‘echo’ problem?
Christopher Millard and Johan David Michels chronicle the pleasures and the pains of launching a cloud computing law course in the cloud….
Historical events have always influenced the law and legal practice, which by their nature must adapt to societal and technological changes. For this 50th Anniversary edition of the magazine, Maulik Mittal revisits a time when computers were just becoming a fundamental part of everyday life, and how the Y2K Bug (and especially the reaction and…
As 2023 starts to draw to a close, it is an appropriate time to take stock of the Cyber landscape as it is and more specifically, threat actors that have been prevalent over the past year. With lower barriers to entry and an expansive risk environment, the cost of cyber-crime has reached £6.6 billion, surpassing…
Read More… from Cyber Crime in Transition: Threat impact and investigation strategies
In the GDPR, the term “vulnerable” appears once. Recital 75 says that the risk to the rights and freedoms of natural persons may result from personal data processing of vulnerable natural persons in particular children, which could lead to physical, material, or non-material damage. What does “vulnerable” mean? Who is a vulnerable natural person, how…
Read More… from BOOK REVIEW: Vulnerability and Data Protection Law
Video games may have been a niche hobby many moons ago, but advances in tech and the drive to commercialise entertainment products have launched ‘gaming’ into the mainstream. Total worldwide revenue of the video games industry is expected to be around $580 bn in 2030. Contrast that with the worldwide cinema box-office revenue of just…
In Internet Empire, Sean Ennis has fashioned a work that is ‘unabashedly not an academic treatise’ and instead aims to act as a refreshing ‘call to action’. There is not a footnote in sight, but it is evident that this highly engaging account of the meteoric rise of a small subset of digital firms is…
Read More… from Book Review: Internet Empire – The Hidden Digital War