Berkley Technology Law Journal

article thumbnail

Taylor Swift’s Copyright Battle and Strategic Re-Recording Songs

Berkley Technology Law Journal

By Andreia M. Tamashiro,* LL.M. 2025 *The author thanks Mr. Gary Greenstein, Partner at Wilson Sonsini, for his guidance on this post. When Taylor Swift announced she was re-recording her first six albums, she wasnt just revisiting past hitsshe was reclaiming ownership of her music. Her battle over album masters highlights a huge issue in the music industry: who truly owns the songs artists create?

Attorney 130
article thumbnail

AI Gets Personal: CCPA vs. GDPR on Automated Decision-Making

Berkley Technology Law Journal

By Ilke Okan LL.M., 2025 Automated decision-making technologies ( ADMTs ) are systems that analyze personal data to predict or decide outcomes about individuals, often without human input. These tools can determine whether someone is approved for a loan, lands a job interview, or is flagged for extra screeningall with limited transparency. As artificial intelligence (AI) and ADMTs become increasingly embedded in daily lifefrom hiring and credit scoring to healthcare and educationregulators are u

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Opt-Out Approaches to AI Training: A False Compromise

Berkley Technology Law Journal

By Barbara Rasin, J.D. Candidate, 2027 The recent boom in generative AI technology has been hampered by accusations that AI training sets violate intellectual property laws. Various rightsholders, including the New York Times and Universal Music Group , have sued the companies behind these algorithms for training on their protected IP without a license.

article thumbnail

The Writings on the Blackbaud: Lessons from the FTC’s First Standalone Section 5 Unfairness Claim

Berkley Technology Law Journal

By Gaurav Lalsinghani, J.D. Candidate, 2025 In February 2024, the Federal Trade Commission (FTC) broke new ground by bringing its first-ever standalone Section 5 unfairness claims for unreasonable data retention and misleading breach notifications. The agencys enforcement action against Blackbauda cloud software provider serving nonprofits, healthcare organizations, and educational institutionsmarked a significant expansion of the Commissions approach to data security enforcement.

article thumbnail

TikTok Sale-or-Ban Law Upheld by Supreme Court: A Turning Point in U.S Tech Regulation

Berkley Technology Law Journal

By Sauntharya Manikandan, J.D. Candidate, 2026 Overview On January 17, 2025, the U.S. Supreme Court unanimously upheld the Protecting Americans from Foreign Adversary Controlled Applications Act also known as the TikTok Sale-or-Ban Law. This law grants the federal government the authority to shut down TikTok unless ByteDance, its China-based parent company, completes a qualified divestiture essentially severing all control over TikTok’s U.S. operations and having the application cut ties w

Court 130
article thumbnail

TikTok Sale-or-Ban Law Upheld by Supreme Court: A Turning Point in U.S Tech Regulation

Berkley Technology Law Journal

By Sauntharya Manikandan, J.D. Candidate, 2026 Overview On January 17, 2025, the U.S. Supreme Court unanimously upheld the Protecting Americans from Foreign Adversary Controlled Applications Act also known as the TikTok Sale-or-Ban Law. This law grants the federal government the authority to shut down TikTok unless ByteDance, its China-based parent company, completes a qualified divestiture essentially severing all control over TikTok’s U.S. operations and having the application cut ties w

Court 130
article thumbnail

The Security ‘Scapegoat?’: When Liability Comes Knocking, CISOs Answer the Call

Berkley Technology Law Journal

By Gaurav Lalsinghani, J.D. Candidate, 2025 No one wants to be left holding the bag after a break-in, but for chief information security officers (CISOs), the risk of liability is ever-present. Tasked with overseeing a firms cybersecurity posture, CISOs stand on the front lines of a corporations digital defense. They are responsible for overseeing an organizations data protection measures, risk management strategies, overall security infrastructure, among other critical responsibilities.