<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/techlaw-chat" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>TechLaw Chat</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/techlaw-chat</itunes:new-feed-url>
    <description>A series of short podcasts exploring emerging and topical issues in technology law.</description>
    <copyright>(c) 2020, Matthew Lavy &amp; Iain Munro</copyright>
    <podcast:guid>27dbd609-47a0-5399-8cc9-40e299bd6a62</podcast:guid>
    <podcast:locked owner="mlavy@4pumpcourt.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Wed, 23 Jul 2025 15:36:55 +0100</pubDate>
    <lastBuildDate>Tue, 02 Dec 2025 21:41:05 +0000</lastBuildDate>
    <link>https://techlaw.chat</link>
    <image>
      <url>https://img.transistor.fm/wdVzncBApbFVJOK_Njb45AlO6sA4yx8-0nOlQFxRmvs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzE0MTcxLzE2MDIw/NzM4NzQtYXJ0d29y/ay5qcGc.jpg</url>
      <title>TechLaw Chat</title>
      <link>https://techlaw.chat</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
    <itunes:image href="https://img.transistor.fm/wdVzncBApbFVJOK_Njb45AlO6sA4yx8-0nOlQFxRmvs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzE0MTcxLzE2MDIw/NzM4NzQtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>A series of short podcasts exploring emerging and topical issues in technology law.</itunes:summary>
    <itunes:subtitle>A series of short podcasts exploring emerging and topical issues in technology law..</itunes:subtitle>
    <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
    <itunes:owner>
      <itunes:name>Matthew Lavy</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Surveillance tech and nosey neighbours</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Surveillance tech and nosey neighbours</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8b8c4964-8cda-4f56-a657-1f58e7fe4766</guid>
      <link>https://share.transistor.fm/s/976d3ee6</link>
      <description>
        <![CDATA[<p>As increasingly sophisticated video and audio recording devices become available to householders at only moderate cost, deployment of such surveillance tech by householders is becoming ubiquitous. However, those deploying these devices do not always consider the impact of their surveillance tech on neighbouring properties or the legal ramifications of that impact. This episode explores this theme, and considers the causes of action and practical steps available to a neighbour adversely affected by overly intrusive surveillance tech. </p><p>References:</p><ul><li>For a couple of illustrative cases that have reached the Courts, see <a href="https://www.judiciary.uk/wp-content/uploads/2021/10/Fairhurst-v-Woodard-Judgment-1.pdf"><em>Fairhurst v Woodard</em></a> [2021] 10 WLUK 151 and <a href="https://www.scotcourts.gov.uk/search-judgments/judgment?id=ecb629a7-8980-69d2-b500-ff0000d74aa7"><em>Woolley &amp; Woolley v Akbar or Akram</em></a><em> </em>[2017] SC EDIN 7.</li><li>ICO guidance is available for <a href="https://ico.org.uk/your-data-matters/domestic-cctv-systems-guidance-for-people-being-filmed/">people being filmed</a> and <a href="https://ico.org.uk/your-data-matters/domestic-cctv-systems-guidance-for-people-using-cctv/">those using domestic CCTV</a>. Some discussion of the 'household exemption' is found in <a href="https://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=160561&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=281794"><em>František Ryneš v Úřad pro ochranu osobních údajů</em></a> [2015] 1 W.L.R. 2607.</li><li>Those in neighbour disputes should consider <a href="https://www.gov.uk/how-to-resolve-neighbour-disputes">these steps</a>, including <a href="https://www.gov.uk/how-to-resolve-neighbour-disputes/use-a-mediation-service">using a mediation service</a>.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As increasingly sophisticated video and audio recording devices become available to householders at only moderate cost, deployment of such surveillance tech by householders is becoming ubiquitous. However, those deploying these devices do not always consider the impact of their surveillance tech on neighbouring properties or the legal ramifications of that impact. This episode explores this theme, and considers the causes of action and practical steps available to a neighbour adversely affected by overly intrusive surveillance tech. </p><p>References:</p><ul><li>For a couple of illustrative cases that have reached the Courts, see <a href="https://www.judiciary.uk/wp-content/uploads/2021/10/Fairhurst-v-Woodard-Judgment-1.pdf"><em>Fairhurst v Woodard</em></a> [2021] 10 WLUK 151 and <a href="https://www.scotcourts.gov.uk/search-judgments/judgment?id=ecb629a7-8980-69d2-b500-ff0000d74aa7"><em>Woolley &amp; Woolley v Akbar or Akram</em></a><em> </em>[2017] SC EDIN 7.</li><li>ICO guidance is available for <a href="https://ico.org.uk/your-data-matters/domestic-cctv-systems-guidance-for-people-being-filmed/">people being filmed</a> and <a href="https://ico.org.uk/your-data-matters/domestic-cctv-systems-guidance-for-people-using-cctv/">those using domestic CCTV</a>. Some discussion of the 'household exemption' is found in <a href="https://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=160561&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=281794"><em>František Ryneš v Úřad pro ochranu osobních údajů</em></a> [2015] 1 W.L.R. 2607.</li><li>Those in neighbour disputes should consider <a href="https://www.gov.uk/how-to-resolve-neighbour-disputes">these steps</a>, including <a href="https://www.gov.uk/how-to-resolve-neighbour-disputes/use-a-mediation-service">using a mediation service</a>.</li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 16 Feb 2022 15:48:07 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/976d3ee6/714f1719.mp3" length="8588001" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>532</itunes:duration>
      <itunes:summary>Exploration of neighbours' rights when householders deploy surveillance tech.</itunes:summary>
      <itunes:subtitle>Exploration of neighbours' rights when householders deploy surveillance tech.</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Child safety on a video-sharing platform</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Child safety on a video-sharing platform</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9f49a9be-bcf5-4fb2-8f69-365b8d86c645</guid>
      <link>https://share.transistor.fm/s/785a92d7</link>
      <description>
        <![CDATA[<p>As of now, the UK has not enacted online harms legislation, and social media platforms in general are under no statutory duty to protect children from harmful content. However, providers of video-sharing platforms <em>do </em>have statutory obligations in that regard, set out in Part 4B of the Communications Act 2003 (added to the Act by amendment in 2020). Amongst other things, section 368Z1 of the Act requires providers of such platforms to make appropriate measures to protect under-18s from videos and audio-visual commercial communications containing "restricted material". Regardless of the statutory obligations (or lack thereof in the case of non-video social media platforms), many platforms expend considerable efforts seeking to protect children from harm.</p><p>In this episode, we consider how a video-sharing start-up might focus its resources in order to comply with its statutory obligations and to maximise the prospects that it offers a safe environment for children. We are joined in this endeavour by <a href="https://www.mdx.ac.uk/about-us/our-people/staff-directory/profile/martellozzo-elena">Dr Elena Martellozzo</a>, an Associate Professor in Criminology at the centre for Child Abuse and Trauma Studies (CATS) at Middlesex University. Elena has extensive experience of applied research within the Criminal Justice arena. Elena’s research includes exploring children and young people’s online behaviour, the analysis of sexual grooming and online harm and police practice in the area of child sexual abuse. Elena has emerged as a leading researcher and global voice in the field of child protection, victimology, policing and cybercrime. She is a prolific writer and has participated in highly sensitive research with the Police, the IWF, the NSPCC, the OCC, the Home Office and other government departments. Elena has also acted as an advisor on child online protection to governments and practitioners in Italy (since 2004) and Bahrain (2016) to develop a national child internet safety policy framework. </p><p>Further reading:</p><ul><li>Part 4B of the Communications Act 2003 can be found here: <a href="https://www.legislation.gov.uk/ukpga/2003/21/part/4B">https://www.legislation.gov.uk/ukpga/2003/21/part/4B</a></li><li>A description of the Internet Watch Foundation technology suite can be found here: <a href="https://protect-eu.mimecast.com/s/vDGxCw12tG8Wk5U9sDEm">https://www.iwf.org.uk/our-technology/</a></li><li>A series of recommendations for various stakeholders (including tech companies) in relation to protection of children online in the age of COVID is made in the <a href="https://glitchcharity.co.uk/wp-content/uploads/2021/04/Glitch-The-Ripple-Effect-Report-COVID-19-online-abuse.pdf">Glitch report</a>.</li><li>An article by Dr Martellozzo and her team on the effect of harmful content on children can be found on Sage Open <a href="https://journals.sagepub.com/doi/full/10.1177/2158244019899462">here</a>.</li><li>Dr Martellozzo explains the grooming process in <a href="%20https://www.sciencedirect.com/science/article/pii/B9780128153444000040?casa_token=CNYOUQXgcxoAAAAA:j1Nh3MNsCX1gyTH_FZjwrxpVsgf0ovmLiZ7jmZG9xYjprQV8NahPISdpDNYi7WwiuIU4MDVGIVY">Chapter 4</a> of Bryce, Robinson and Petherick, <em>Child Abuse and Neglect: </em>here: <em>Forensic Issues in Evidence, Impact and Management</em>, Academic Press, 2019.</li><li>In the LSE-hosted blogpost <a href="https://blogs.lse.ac.uk/medialse/2021/12/17/speaking-up-contributing-to-the-fight-against-gender-based-violence-online/">Speaking Up: Contributing to the fight against gender-based online violence</a>, Dr Martellozzo, Paula Bradbury and Emma Short provide commentary and references on this issue.</li></ul><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>As of now, the UK has not enacted online harms legislation, and social media platforms in general are under no statutory duty to protect children from harmful content. However, providers of video-sharing platforms <em>do </em>have statutory obligations in that regard, set out in Part 4B of the Communications Act 2003 (added to the Act by amendment in 2020). Amongst other things, section 368Z1 of the Act requires providers of such platforms to make appropriate measures to protect under-18s from videos and audio-visual commercial communications containing "restricted material". Regardless of the statutory obligations (or lack thereof in the case of non-video social media platforms), many platforms expend considerable efforts seeking to protect children from harm.</p><p>In this episode, we consider how a video-sharing start-up might focus its resources in order to comply with its statutory obligations and to maximise the prospects that it offers a safe environment for children. We are joined in this endeavour by <a href="https://www.mdx.ac.uk/about-us/our-people/staff-directory/profile/martellozzo-elena">Dr Elena Martellozzo</a>, an Associate Professor in Criminology at the centre for Child Abuse and Trauma Studies (CATS) at Middlesex University. Elena has extensive experience of applied research within the Criminal Justice arena. Elena’s research includes exploring children and young people’s online behaviour, the analysis of sexual grooming and online harm and police practice in the area of child sexual abuse. Elena has emerged as a leading researcher and global voice in the field of child protection, victimology, policing and cybercrime. She is a prolific writer and has participated in highly sensitive research with the Police, the IWF, the NSPCC, the OCC, the Home Office and other government departments. Elena has also acted as an advisor on child online protection to governments and practitioners in Italy (since 2004) and Bahrain (2016) to develop a national child internet safety policy framework. </p><p>Further reading:</p><ul><li>Part 4B of the Communications Act 2003 can be found here: <a href="https://www.legislation.gov.uk/ukpga/2003/21/part/4B">https://www.legislation.gov.uk/ukpga/2003/21/part/4B</a></li><li>A description of the Internet Watch Foundation technology suite can be found here: <a href="https://protect-eu.mimecast.com/s/vDGxCw12tG8Wk5U9sDEm">https://www.iwf.org.uk/our-technology/</a></li><li>A series of recommendations for various stakeholders (including tech companies) in relation to protection of children online in the age of COVID is made in the <a href="https://glitchcharity.co.uk/wp-content/uploads/2021/04/Glitch-The-Ripple-Effect-Report-COVID-19-online-abuse.pdf">Glitch report</a>.</li><li>An article by Dr Martellozzo and her team on the effect of harmful content on children can be found on Sage Open <a href="https://journals.sagepub.com/doi/full/10.1177/2158244019899462">here</a>.</li><li>Dr Martellozzo explains the grooming process in <a href="%20https://www.sciencedirect.com/science/article/pii/B9780128153444000040?casa_token=CNYOUQXgcxoAAAAA:j1Nh3MNsCX1gyTH_FZjwrxpVsgf0ovmLiZ7jmZG9xYjprQV8NahPISdpDNYi7WwiuIU4MDVGIVY">Chapter 4</a> of Bryce, Robinson and Petherick, <em>Child Abuse and Neglect: </em>here: <em>Forensic Issues in Evidence, Impact and Management</em>, Academic Press, 2019.</li><li>In the LSE-hosted blogpost <a href="https://blogs.lse.ac.uk/medialse/2021/12/17/speaking-up-contributing-to-the-fight-against-gender-based-violence-online/">Speaking Up: Contributing to the fight against gender-based online violence</a>, Dr Martellozzo, Paula Bradbury and Emma Short provide commentary and references on this issue.</li></ul><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 11 Jan 2022 11:31:14 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/785a92d7/e9af26cb.mp3" length="8579186" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>532</itunes:duration>
      <itunes:summary>Protecting children from harmful video-streaming content</itunes:summary>
      <itunes:subtitle>Protecting children from harmful video-streaming content</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Kris Proposes Drone Delivery</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Kris Proposes Drone Delivery</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">527eef8b-3d29-4049-9574-79bd4aabc361</guid>
      <link>https://share.transistor.fm/s/921b6571</link>
      <description>
        <![CDATA[<p>This end-of-year episode explores the viability of delivery of Christmas gifts by drone in UK airspace. Someone has ambitious plans involving the precision drop of parcels down chimneys. We discuss the legal risks that arise and the hurdles that will have to be jumped if the Civil Aviation Authority is to authorise that plan.</p><p>Further reading:</p><ul><li>The primary guidance document for those wishing to operate unmanned aircraft systems within the UK is <a href="https://publicapps.caa.co.uk/modalapplication.aspx?appid=11&amp;id=415&amp;mode=detail">CAP722</a>.  It sets out the relevant law and provides substantial amounts of operational material and guidance.</li><li>The Civil Aviation Authority’s ‘Drone and Model Aircraft Code’ can be found <a href="https://register-drones.caa.co.uk/drone-code">here</a>.</li><li>The two legislative sources referred to in the podcast are the <a href="https://www.legislation.gov.uk/uksi/2016/765/contents">Air Navigation Order 2016</a> and the <a href="https://www.legislation.gov.uk/ukpga/1982/16/contents">Civil Aviation Act 1982</a>.</li></ul><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This end-of-year episode explores the viability of delivery of Christmas gifts by drone in UK airspace. Someone has ambitious plans involving the precision drop of parcels down chimneys. We discuss the legal risks that arise and the hurdles that will have to be jumped if the Civil Aviation Authority is to authorise that plan.</p><p>Further reading:</p><ul><li>The primary guidance document for those wishing to operate unmanned aircraft systems within the UK is <a href="https://publicapps.caa.co.uk/modalapplication.aspx?appid=11&amp;id=415&amp;mode=detail">CAP722</a>.  It sets out the relevant law and provides substantial amounts of operational material and guidance.</li><li>The Civil Aviation Authority’s ‘Drone and Model Aircraft Code’ can be found <a href="https://register-drones.caa.co.uk/drone-code">here</a>.</li><li>The two legislative sources referred to in the podcast are the <a href="https://www.legislation.gov.uk/uksi/2016/765/contents">Air Navigation Order 2016</a> and the <a href="https://www.legislation.gov.uk/ukpga/1982/16/contents">Civil Aviation Act 1982</a>.</li></ul><p> </p>]]>
      </content:encoded>
      <pubDate>Tue, 21 Dec 2021 12:07:11 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/921b6571/71fee1ea.mp3" length="8795281" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>545</itunes:duration>
      <itunes:summary>How UK drone legislation would affect modernisation of Santa's deliveries</itunes:summary>
      <itunes:subtitle>How UK drone legislation would affect modernisation of Santa's deliveries</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Data protection representative actions: door slammed shut or door ajar?</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Data protection representative actions: door slammed shut or door ajar?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b88ed8f-2bd4-4910-b258-48123a6eae30</guid>
      <link>https://share.transistor.fm/s/65982f18</link>
      <description>
        <![CDATA[<p>The long-anticipated Supreme Court decision in <em>Lloyd v Google</em> [2021] UKSC 50 was handed down on 10 November 2021. Reversing the decision of the Court of Appeal and reinstating the first instance decision of Warby J, the Supreme Court held that Richard Lloyd could not pursue a damages claim as representative of the class of individuals affected by Google's alleged breach of the Data Protection Act 1998 in relation to the so-called "safari workaround". The reasoning is involved, and the Judgment bears reading in full. In essence, however, the court held that establishing a right to damages for breach of the Data Protection Act 1998, and quantifying those damages, involved a claimant-by-claimant analysis that, in each case, must identify the breach affecting that claimant, the loss suffered by that claimant, and the causal connection between breach and loss. The claims were accordingly unsuitable in principle for a representative action. The Judgment also addressed in some detail the nature of damages for breach of data protection legislation, and the nature and scope of representative actions under CPR 19.6.</p><p>In this episode we explore some of the ramifications of the decision through a scenario involving a data breach at an online marketplace.</p><p>The Judgment may be found <a href="https://www.supremecourt.uk/cases/docs/uksc-2019-0213-judgment.pdf">here</a>, and a press summary <a href="https://www.supremecourt.uk/press-summary/uksc-2019-0213.html">here</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The long-anticipated Supreme Court decision in <em>Lloyd v Google</em> [2021] UKSC 50 was handed down on 10 November 2021. Reversing the decision of the Court of Appeal and reinstating the first instance decision of Warby J, the Supreme Court held that Richard Lloyd could not pursue a damages claim as representative of the class of individuals affected by Google's alleged breach of the Data Protection Act 1998 in relation to the so-called "safari workaround". The reasoning is involved, and the Judgment bears reading in full. In essence, however, the court held that establishing a right to damages for breach of the Data Protection Act 1998, and quantifying those damages, involved a claimant-by-claimant analysis that, in each case, must identify the breach affecting that claimant, the loss suffered by that claimant, and the causal connection between breach and loss. The claims were accordingly unsuitable in principle for a representative action. The Judgment also addressed in some detail the nature of damages for breach of data protection legislation, and the nature and scope of representative actions under CPR 19.6.</p><p>In this episode we explore some of the ramifications of the decision through a scenario involving a data breach at an online marketplace.</p><p>The Judgment may be found <a href="https://www.supremecourt.uk/cases/docs/uksc-2019-0213-judgment.pdf">here</a>, and a press summary <a href="https://www.supremecourt.uk/press-summary/uksc-2019-0213.html">here</a>.</p>]]>
      </content:encoded>
      <pubDate>Thu, 11 Nov 2021 17:19:28 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/65982f18/31c3c682.mp3" length="8170988" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>506</itunes:duration>
      <itunes:summary>Ramifications of the Supreme Court's decision in the Lloyd v Google litigation.</itunes:summary>
      <itunes:subtitle>Ramifications of the Supreme Court's decision in the Lloyd v Google litigation.</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Emperor's New Tokens?</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>The Emperor's New Tokens?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">51c5c67d-2198-4c70-bcec-81641ded959f</guid>
      <link>https://share.transistor.fm/s/9ada6db9</link>
      <description>
        <![CDATA[<p>Non-fungible tokens (or 'NFTs') are a blockchain-based mechanism for uniquely identifying digital assets, and verifying both authenticity and ownership. An increasingly popular use case for NFTs (albeit it is only one of several use cases) involves the creation and sale of digital art. Notwithstanding that the NFT marketplace for digital art is dynamic and growing (with some NFTs selling at auction for vast sums), the legal basis of NFTs and, critically, the nature of what a purchaser actually acquires when purchasing an NFT artwork, are not universally understood. We explore these issues in this episode, which concerns the purchase of an NFT image for commercial use.</p><p>Further reading:</p><ul><li>A useful introduction to NFTs, together with links for further reading, can be found on the Ethereum website here: <a href="https://ethereum.org/en/nft/">https://ethereum.org/en/nft/</a>.</li><li>An entertaining explanation of the phenomenon of digital art NFTs can be found here: <a href="https://www.theverge.com/22310188/nft-explainer-what-is-blockchain-crypto-art-faq">https://www.theverge.com/22310188/nft-explainer-what-is-blockchain-crypto-art-faq</a>.</li><li>For those who want to dig into the detail, the most commonly used technical standard for NFTs is currently ERC-721, which is explained here: <a href="https://ethereum.org/en/developers/docs/standards/tokens/erc-721/">https://ethereum.org/en/developers/docs/standards/tokens/erc-721/</a>.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Non-fungible tokens (or 'NFTs') are a blockchain-based mechanism for uniquely identifying digital assets, and verifying both authenticity and ownership. An increasingly popular use case for NFTs (albeit it is only one of several use cases) involves the creation and sale of digital art. Notwithstanding that the NFT marketplace for digital art is dynamic and growing (with some NFTs selling at auction for vast sums), the legal basis of NFTs and, critically, the nature of what a purchaser actually acquires when purchasing an NFT artwork, are not universally understood. We explore these issues in this episode, which concerns the purchase of an NFT image for commercial use.</p><p>Further reading:</p><ul><li>A useful introduction to NFTs, together with links for further reading, can be found on the Ethereum website here: <a href="https://ethereum.org/en/nft/">https://ethereum.org/en/nft/</a>.</li><li>An entertaining explanation of the phenomenon of digital art NFTs can be found here: <a href="https://www.theverge.com/22310188/nft-explainer-what-is-blockchain-crypto-art-faq">https://www.theverge.com/22310188/nft-explainer-what-is-blockchain-crypto-art-faq</a>.</li><li>For those who want to dig into the detail, the most commonly used technical standard for NFTs is currently ERC-721, which is explained here: <a href="https://ethereum.org/en/developers/docs/standards/tokens/erc-721/">https://ethereum.org/en/developers/docs/standards/tokens/erc-721/</a>.</li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 29 Jul 2021 15:50:27 +0100</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/9ada6db9/b145009c.mp3" length="7861942" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>487</itunes:duration>
      <itunes:summary>An exploration of the legal nature of NFTs for digital art</itunes:summary>
      <itunes:subtitle>An exploration of the legal nature of NFTs for digital art</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Keeping it ethical</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Keeping it ethical</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3c5eb9d-0c7c-4e69-8727-c2a77e909302</guid>
      <link>https://share.transistor.fm/s/c8b278da</link>
      <description>
        <![CDATA[<p>AI companies need to engage with the ethical implications of their systems. That involves planning ahead: in this episode, we therefore look at the European Union’s proposed AI regulation, and – with the help of our guest, Patricia Shaw – discuss its application in an EdTech context. The proposed regulation is available <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1623335154975&amp;uri=CELEX%3A52021PC0206">here</a>.</p><p>Patricia Shaw is CEO of Beyond Reach Consulting Ltd, providing AI/data ethics strategy, public policy engagement, bespoke AI/data ethics risk and governance advice, and advisory board services, across financial services, public sector (Health- and EdTech), and smart cities. </p><p> </p><p>Trish is passionate about Responsible AI and is an expert advisor to IEEE’s Ethical Certification Program for Autonomous Intelligent Systems and P7003 (algorithmic bias) standards programme, a Fellow of ForHumanity contributing to the Independent Audit of AI Systems. She contributed to The Institute for Ethical AI in Education’s Ethical Framework for AI in Education, and is a Fellow of the Royal Society of Arts having been on the Advisory Board for the ‘Power over information’project concerning regulation of online harms.</p><p> </p><p>A non-practising Solicitor, public speaker, and author, Trish is also Chair of the Trustee Board of the Society for Computers and Law, Member of the Board of iTechlaw as well as Vice Chair of their AI committee.  She is listed on 2021 - 100 Brilliant Women in AI Ethics™.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI companies need to engage with the ethical implications of their systems. That involves planning ahead: in this episode, we therefore look at the European Union’s proposed AI regulation, and – with the help of our guest, Patricia Shaw – discuss its application in an EdTech context. The proposed regulation is available <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?qid=1623335154975&amp;uri=CELEX%3A52021PC0206">here</a>.</p><p>Patricia Shaw is CEO of Beyond Reach Consulting Ltd, providing AI/data ethics strategy, public policy engagement, bespoke AI/data ethics risk and governance advice, and advisory board services, across financial services, public sector (Health- and EdTech), and smart cities. </p><p> </p><p>Trish is passionate about Responsible AI and is an expert advisor to IEEE’s Ethical Certification Program for Autonomous Intelligent Systems and P7003 (algorithmic bias) standards programme, a Fellow of ForHumanity contributing to the Independent Audit of AI Systems. She contributed to The Institute for Ethical AI in Education’s Ethical Framework for AI in Education, and is a Fellow of the Royal Society of Arts having been on the Advisory Board for the ‘Power over information’project concerning regulation of online harms.</p><p> </p><p>A non-practising Solicitor, public speaker, and author, Trish is also Chair of the Trustee Board of the Society for Computers and Law, Member of the Board of iTechlaw as well as Vice Chair of their AI committee.  She is listed on 2021 - 100 Brilliant Women in AI Ethics™.</p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Jul 2021 16:15:44 +0100</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/c8b278da/46bffb8c.mp3" length="9582553" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>595</itunes:duration>
      <itunes:summary>Ethical AI and compliance with the draft EU AI Regulation in an EdTech context</itunes:summary>
      <itunes:subtitle>Ethical AI and compliance with the draft EU AI Regulation in an EdTech context</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>At the AI's discretion</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>At the AI's discretion</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef1f29a2-06a8-4cf8-8636-d50e346c7ed8</guid>
      <link>https://share.transistor.fm/s/a28085c7</link>
      <description>
        <![CDATA[<p>Where a contract confers a discretion on one party that materially affects the rights of its counterparty,  the discretion must be exercised rationally. The Supreme Court held in <em>Braganza v BP Shipping Ltd</em> [2015] UKSC 17 that exercising a discretion rationally involves (i) taking the right things (and only the right things) into account, and (ii) avoiding a decision that no reasonable decision-maker could have reached. In this episode, we explore how those principles might operate in the context of a discretion exercised automatically by a machine learning algorithm. We do so in the context of a fraud detection algorithm and an online farmers' market somewhere in East Anglia.</p><p>Further reading:</p><ul><li>This episode was inspired by Tom Whittaker's thought-provoking article on the case of <em>TF Global Markets (UK) (trading as ThinkMarkets)) v Financial Ombudsman Service Limited</em> [2020] EWHC 3178 (Admin). The article may be found here: <a href="https://www.lexology.com/library/detail.aspx?g=ad5569ea-af1a-4040-b596-a6a29b3c73b0">https://www.lexology.com/library/detail.aspx?g=ad5569ea-af1a-4040-b596-a6a29b3c73b0</a></li><li>Supreme Court decision in <em>Braganza v BP Shipping Ltd</em> [2015] UKSC 17: <a href="https://www.supremecourt.uk/cases/uksc-2013-0099.html">https://www.supremecourt.uk/cases/uksc-2013-0099.html</a></li><li>Anyone with any doubts as to the prevalence of AI-based fraud detection systems might like to do this: <a href="https://letmegooglethat.com/?q=ai+fraud+detection">https://letmegooglethat.com/?q=ai+fraud+detection</a>. There is no problem in principle with using such tools. The issue (in a contractual context) is how their outputs are translated into discretionary decisions.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Where a contract confers a discretion on one party that materially affects the rights of its counterparty,  the discretion must be exercised rationally. The Supreme Court held in <em>Braganza v BP Shipping Ltd</em> [2015] UKSC 17 that exercising a discretion rationally involves (i) taking the right things (and only the right things) into account, and (ii) avoiding a decision that no reasonable decision-maker could have reached. In this episode, we explore how those principles might operate in the context of a discretion exercised automatically by a machine learning algorithm. We do so in the context of a fraud detection algorithm and an online farmers' market somewhere in East Anglia.</p><p>Further reading:</p><ul><li>This episode was inspired by Tom Whittaker's thought-provoking article on the case of <em>TF Global Markets (UK) (trading as ThinkMarkets)) v Financial Ombudsman Service Limited</em> [2020] EWHC 3178 (Admin). The article may be found here: <a href="https://www.lexology.com/library/detail.aspx?g=ad5569ea-af1a-4040-b596-a6a29b3c73b0">https://www.lexology.com/library/detail.aspx?g=ad5569ea-af1a-4040-b596-a6a29b3c73b0</a></li><li>Supreme Court decision in <em>Braganza v BP Shipping Ltd</em> [2015] UKSC 17: <a href="https://www.supremecourt.uk/cases/uksc-2013-0099.html">https://www.supremecourt.uk/cases/uksc-2013-0099.html</a></li><li>Anyone with any doubts as to the prevalence of AI-based fraud detection systems might like to do this: <a href="https://letmegooglethat.com/?q=ai+fraud+detection">https://letmegooglethat.com/?q=ai+fraud+detection</a>. There is no problem in principle with using such tools. The issue (in a contractual context) is how their outputs are translated into discretionary decisions.</li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 07 Apr 2021 10:37:11 +0100</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/a28085c7/591b3bab.mp3" length="8141135" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>504</itunes:duration>
      <itunes:summary>Legal implications of AI exercising a contractual discretion to prevent sales</itunes:summary>
      <itunes:subtitle>Legal implications of AI exercising a contractual discretion to prevent sales</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Computer says "Go!"</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Computer says "Go!"</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a339e87b-4dc0-469a-a3c0-6d9cb1276d8c</guid>
      <link>https://share.transistor.fm/s/3c1c0d9f</link>
      <description>
        <![CDATA[<p>Fully autonomous vehicles may be a few years away, but cars offering so-called “eyes off/hands off”, or “Level 3” automation, whereby the car is sufficiently capable that the driver’s role is limited to taking over control when requested by the car to do so, is expected to be commercially available in the very near future. In this episode we flash forward to summer 2023 and an accident involving a Level 3 autonomous vehicle. We consider how existing legal frameworks cope with the liability issues that arise when AI takes control of the driving but where the driver remains in the safety chain as a fallback for when the automation cannot cope.</p><p> </p><p>Further reading:</p><ul><li>Riley-Smith QC and McCormick, ‘Liability for Physical Damage’ in <em>The Law of Artificial Intelligence</em> (2020), which helped to inspire our scenario.</li><li>Glassbrook, Northey and Milligan, <em>A Practical Guide to the Law of Driverless Cars</em> (2019).</li><li>The hack involved in this scenario: <a href="https://interestingengineering.com/teslas-autopilot-can-be-tricked-in-just-a-split-second-through-this-method">https://interestingengineering.com/teslas-autopilot-can-be-tricked-in-just-a-split-second-through-this-method</a></li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Fully autonomous vehicles may be a few years away, but cars offering so-called “eyes off/hands off”, or “Level 3” automation, whereby the car is sufficiently capable that the driver’s role is limited to taking over control when requested by the car to do so, is expected to be commercially available in the very near future. In this episode we flash forward to summer 2023 and an accident involving a Level 3 autonomous vehicle. We consider how existing legal frameworks cope with the liability issues that arise when AI takes control of the driving but where the driver remains in the safety chain as a fallback for when the automation cannot cope.</p><p> </p><p>Further reading:</p><ul><li>Riley-Smith QC and McCormick, ‘Liability for Physical Damage’ in <em>The Law of Artificial Intelligence</em> (2020), which helped to inspire our scenario.</li><li>Glassbrook, Northey and Milligan, <em>A Practical Guide to the Law of Driverless Cars</em> (2019).</li><li>The hack involved in this scenario: <a href="https://interestingengineering.com/teslas-autopilot-can-be-tricked-in-just-a-split-second-through-this-method">https://interestingengineering.com/teslas-autopilot-can-be-tricked-in-just-a-split-second-through-this-method</a></li></ul>]]>
      </content:encoded>
      <pubDate>Thu, 18 Mar 2021 11:04:56 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/3c1c0d9f/b7c40cb9.mp3" length="9595207" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>595</itunes:duration>
      <itunes:summary>Driver liability when "eyes off/hands off" automation fails</itunes:summary>
      <itunes:subtitle>Driver liability when "eyes off/hands off" automation fails</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The Black Box problem</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>The Black Box problem</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">76320c6e-f11f-4c06-b8cc-86907186af5b</guid>
      <link>https://share.transistor.fm/s/961facbc</link>
      <description>
        <![CDATA[<p>AI can improve how businesses make decisions. But how does a business explain the rationale behind AI decisions to its customers? In this episode, we explore this issue through the scenario of a bank that uses AI to evaluate loan applications and needs to be able to explain to customers why an application may have been rejected. We do so with the help of Andrew Burgess, founder of Greenhouse Intelligence (<a href="mailto:andrew@thegreenhouse.ai">andrew@thegreenhouse.ai</a>).</p><p> </p><p><strong>About Andrew</strong>: He has worked as an advisor to C-level executives in Technology and Sourcing for the past 25 years. He is considered a thought-leader and practitioner in AI and Robotic Process Automation, and is regularly invited to speak at conferences on the subject. He is a strategic advisor to a number of ambitious companies in the field of disruptive technologies. Andrew has written two books - <a href="https://protect-eu.mimecast.com/s/wFa9CG0zt10r4BfXGEPD"><em>The Executive Guide to Artificial Intelligence</em></a> (Palgrave MacMillan, 2018) and, with the London School of Economics, <a href="https://protect-eu.mimecast.com/s/Cb5ACJBzfq1kwBimsUNk"><em>The Rise of Legal Services Outsourcing</em></a><em> </em>(Bloomsbury, 2014). He is Visiting Senior Fellow in AI and RPA at Loughborough University and Expert-In-Residence for AI at Imperial College’s Enterprise Lab. He is a prolific writer on the ‘future of work’ both in his popular weekly newsletter and in industry magazines and blogs. </p><p> </p><p>Further reading:</p><ul><li>ICO and The Alan Turing Institute, ‘<a href="https://protect-eu.mimecast.com/s/GGSECKDzi2BQWDiy3Ogs">Explaining decisions made with AI</a>’ (2020)</li><li>ICO, ‘<a href="https://protect-eu.mimecast.com/s/-MgmCLE0IRm09kuGQmyZ">Guide to the General Data Protection Regulation (GDPR)</a>’ (2021)</li><li>The Data Protection &amp; Privacy chapter in <a href="https://protect-eu.mimecast.com/s/7SFJCMGNcqRp32i46-oH"><em>The Law of Artificial Intelligence</em></a> (Sweet &amp; Maxwell, 2020)</li><li>An explanation of the SHAP and LIME tools mentioned by Andrew can be found at <a href="https://protect-eu.mimecast.com/s/8lN4Cr1Bt81yZrh77Yua">https://towardsdatascience.com/idea-behind-lime-and-shap-b603d35d34eb</a>, and a deeper explanation for the more mathematically minded can be found here: <a href="https://protect-eu.mimecast.com/s/ZvXKCv1Rt72J8EiXNBWy">https://www.kdnuggets.com/2019/12/interpretability-part-3-lime-shap.html</a> </li></ul><p> </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>AI can improve how businesses make decisions. But how does a business explain the rationale behind AI decisions to its customers? In this episode, we explore this issue through the scenario of a bank that uses AI to evaluate loan applications and needs to be able to explain to customers why an application may have been rejected. We do so with the help of Andrew Burgess, founder of Greenhouse Intelligence (<a href="mailto:andrew@thegreenhouse.ai">andrew@thegreenhouse.ai</a>).</p><p> </p><p><strong>About Andrew</strong>: He has worked as an advisor to C-level executives in Technology and Sourcing for the past 25 years. He is considered a thought-leader and practitioner in AI and Robotic Process Automation, and is regularly invited to speak at conferences on the subject. He is a strategic advisor to a number of ambitious companies in the field of disruptive technologies. Andrew has written two books - <a href="https://protect-eu.mimecast.com/s/wFa9CG0zt10r4BfXGEPD"><em>The Executive Guide to Artificial Intelligence</em></a> (Palgrave MacMillan, 2018) and, with the London School of Economics, <a href="https://protect-eu.mimecast.com/s/Cb5ACJBzfq1kwBimsUNk"><em>The Rise of Legal Services Outsourcing</em></a><em> </em>(Bloomsbury, 2014). He is Visiting Senior Fellow in AI and RPA at Loughborough University and Expert-In-Residence for AI at Imperial College’s Enterprise Lab. He is a prolific writer on the ‘future of work’ both in his popular weekly newsletter and in industry magazines and blogs. </p><p> </p><p>Further reading:</p><ul><li>ICO and The Alan Turing Institute, ‘<a href="https://protect-eu.mimecast.com/s/GGSECKDzi2BQWDiy3Ogs">Explaining decisions made with AI</a>’ (2020)</li><li>ICO, ‘<a href="https://protect-eu.mimecast.com/s/-MgmCLE0IRm09kuGQmyZ">Guide to the General Data Protection Regulation (GDPR)</a>’ (2021)</li><li>The Data Protection &amp; Privacy chapter in <a href="https://protect-eu.mimecast.com/s/7SFJCMGNcqRp32i46-oH"><em>The Law of Artificial Intelligence</em></a> (Sweet &amp; Maxwell, 2020)</li><li>An explanation of the SHAP and LIME tools mentioned by Andrew can be found at <a href="https://protect-eu.mimecast.com/s/8lN4Cr1Bt81yZrh77Yua">https://towardsdatascience.com/idea-behind-lime-and-shap-b603d35d34eb</a>, and a deeper explanation for the more mathematically minded can be found here: <a href="https://protect-eu.mimecast.com/s/ZvXKCv1Rt72J8EiXNBWy">https://www.kdnuggets.com/2019/12/interpretability-part-3-lime-shap.html</a> </li></ul><p> </p>]]>
      </content:encoded>
      <pubDate>Fri, 05 Feb 2021 15:27:45 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/961facbc/5b8101a7.mp3" length="9327419" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>579</itunes:duration>
      <itunes:summary>Explaining AI decisions</itunes:summary>
      <itunes:subtitle>Explaining AI decisions</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Track it with a Smart Contract?</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Track it with a Smart Contract?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">38ca988c-97a7-4e92-8f16-6d5a2ef09e48</guid>
      <link>https://share.transistor.fm/s/c4c217ba</link>
      <description>
        <![CDATA[<p>This podcast explores the benefits and limitations of Smart Contracts in the context of human-provided services by considering the practicalities of using Smart Contracts to regulate the contractual relationship between brands and social media influencers.</p><p> </p><p>Further reading:</p><ul><li>For a more detailed discussion of smart contracts, see the Legal Statement on cryptoassets and smart contracts, November 2019, published by the LawTech Delivery Panel UK Jurisdiction Taskforce (downloadable <a href="https://35z8e83m1ih83drye280o9d1-wpengine.netdna-ssl.com/wp-content/uploads/2019/11/6.6056_JO_Cryptocurrencies_Statement_FINAL_WEB_111119-1.pdf">here</a>).</li><li>If you’d like to see one of the starting points - N. Szabo, “Smart contracts: building blocks for digital markets.” (1996) EXTROPY: The Journal of Transhumanist Thought, (16), 18(2), available in revised draft <a href="https://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html">here</a>. </li><li>For some insight into the vulnerabilities – see, e.g., Singh et al ‘<a href="https://www.sciencedirect.com/science/article/pii/S0167404818310927">Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities</a>’, <em>Computers &amp; Security </em>88 (2020) 101654.</li><li>A promising application of Smart Contracts is in supply chains – discussed <a href="https://hbr.org/2020/05/building-a-transparent-supply-chain">here</a> in the Harvard Business Review. </li><li>Our scenario was inspired by a CoinDesk article on 22 January 2015 (‘<a href="https://www.coindesk.com/ex-rugby-star-smart-contracts-prevent-legal-disputes-sport">Ex-Rugby Star: Smart Contracts Could Prevent Legal Disputes in Sport</a>’).</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This podcast explores the benefits and limitations of Smart Contracts in the context of human-provided services by considering the practicalities of using Smart Contracts to regulate the contractual relationship between brands and social media influencers.</p><p> </p><p>Further reading:</p><ul><li>For a more detailed discussion of smart contracts, see the Legal Statement on cryptoassets and smart contracts, November 2019, published by the LawTech Delivery Panel UK Jurisdiction Taskforce (downloadable <a href="https://35z8e83m1ih83drye280o9d1-wpengine.netdna-ssl.com/wp-content/uploads/2019/11/6.6056_JO_Cryptocurrencies_Statement_FINAL_WEB_111119-1.pdf">here</a>).</li><li>If you’d like to see one of the starting points - N. Szabo, “Smart contracts: building blocks for digital markets.” (1996) EXTROPY: The Journal of Transhumanist Thought, (16), 18(2), available in revised draft <a href="https://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html">here</a>. </li><li>For some insight into the vulnerabilities – see, e.g., Singh et al ‘<a href="https://www.sciencedirect.com/science/article/pii/S0167404818310927">Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities</a>’, <em>Computers &amp; Security </em>88 (2020) 101654.</li><li>A promising application of Smart Contracts is in supply chains – discussed <a href="https://hbr.org/2020/05/building-a-transparent-supply-chain">here</a> in the Harvard Business Review. </li><li>Our scenario was inspired by a CoinDesk article on 22 January 2015 (‘<a href="https://www.coindesk.com/ex-rugby-star-smart-contracts-prevent-legal-disputes-sport">Ex-Rugby Star: Smart Contracts Could Prevent Legal Disputes in Sport</a>’).</li></ul>]]>
      </content:encoded>
      <pubDate>Tue, 22 Dec 2020 09:02:34 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/c4c217ba/d28c1555.mp3" length="13082087" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>542</itunes:duration>
      <itunes:summary>The promise and limitations of Smart Contracts for human-provided services.</itunes:summary>
      <itunes:subtitle>The promise and limitations of Smart Contracts for human-provided services.</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>You've been hacked. Now pay us £££! (Part 2)</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>You've been hacked. Now pay us £££! (Part 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21634f90-df0c-4c8f-9956-f76ca14e282f</guid>
      <link>https://share.transistor.fm/s/2ef9b494</link>
      <description>
        <![CDATA[<p>This podcast, which continues the story started in Episode 3, considers the liability implications arising out the exfiltration of a client's confidential technical data following a cyber attack.</p><p>For further reading, we recommend:</p><ul><li>Decode.legal's excellent primer on <a href="https://cybersecurityforlawyers.org/doku.php">Cybersecurity for Lawyers</a>.</li><li>Schneier's "<a href="https://www.schneier.com/books/click-here/">click here to kill everybody</a>", a thought provoking  discussion of present and future cyber attacks and their consequences.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This podcast, which continues the story started in Episode 3, considers the liability implications arising out the exfiltration of a client's confidential technical data following a cyber attack.</p><p>For further reading, we recommend:</p><ul><li>Decode.legal's excellent primer on <a href="https://cybersecurityforlawyers.org/doku.php">Cybersecurity for Lawyers</a>.</li><li>Schneier's "<a href="https://www.schneier.com/books/click-here/">click here to kill everybody</a>", a thought provoking  discussion of present and future cyber attacks and their consequences.</li></ul>]]>
      </content:encoded>
      <pubDate>Mon, 07 Dec 2020 14:18:02 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/2ef9b494/138ec861.mp3" length="12140125" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>505</itunes:duration>
      <itunes:summary>Liability arising out of cyber attack involving highly confidential client data</itunes:summary>
      <itunes:subtitle>Liability arising out of cyber attack involving highly confidential client data</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>You've been hacked. Now pay us £££! (Part 1)</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>You've been hacked. Now pay us £££! (Part 1)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7dc524be-5986-4bac-bb62-35346e6f4679</guid>
      <link>https://share.transistor.fm/s/8f2120a2</link>
      <description>
        <![CDATA[<p>This podcast explores some immediate actions that might be needed where an apparent ransomware attack threatens the leak of highly confidential technical data. For this podcast, Matthew and Iain are joined by Michael Brown of <a href="https://northwallcyber.com/">Northwall Cyber</a>.</p><p>For further reading, we recommend:</p><ul><li>Decode.legal's excellent primer on <a href="https://cybersecurityforlawyers.org/doku.php">Cybersecurity for Lawyers</a>.</li><li>Schneier's "<a href="https://www.schneier.com/books/click-here/">click here to kill everybody</a>", a thought provoking  discussion of present and future cyber attacks and their consequences.</li></ul>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This podcast explores some immediate actions that might be needed where an apparent ransomware attack threatens the leak of highly confidential technical data. For this podcast, Matthew and Iain are joined by Michael Brown of <a href="https://northwallcyber.com/">Northwall Cyber</a>.</p><p>For further reading, we recommend:</p><ul><li>Decode.legal's excellent primer on <a href="https://cybersecurityforlawyers.org/doku.php">Cybersecurity for Lawyers</a>.</li><li>Schneier's "<a href="https://www.schneier.com/books/click-here/">click here to kill everybody</a>", a thought provoking  discussion of present and future cyber attacks and their consequences.</li></ul>]]>
      </content:encoded>
      <pubDate>Wed, 04 Nov 2020 19:35:21 +0000</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/8f2120a2/10eb7b5b.mp3" length="23135681" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>576</itunes:duration>
      <itunes:summary>Response to a ransomware attack and threat to confidential data.</itunes:summary>
      <itunes:subtitle>Response to a ransomware attack and threat to confidential data.</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Give me my Bitcoin back!</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Give me my Bitcoin back!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3fcc612d-9d41-4c9b-8db5-a0ba5f9f5663</guid>
      <link>https://share.transistor.fm/s/53fbf7c5</link>
      <description>
        <![CDATA[<p>This podcast explores the legal remedies that are available when Bitcoin are misappropriated, and some of the practical challenges of enforcement. For a more detailed analysis of the treatment of cryptoassets as property, see the Legal Statement on cryptoassets and smart contracts, November 2019, published by the LawTech Delivery Panel UK Jurisdiction Taskforce (downloadable <a href="https://35z8e83m1ih83drye280o9d1-wpengine.netdna-ssl.com/wp-content/uploads/2019/11/6.6056_JO_Cryptocurrencies_Statement_FINAL_WEB_111119-1.pdf">here</a>).</p><p>The legal basis for recovery of fraudulently misappropriated Bitcoin and factors that are engaged on an interim application are addressed in <em>AA v Persons Unkown, Re Bitcoin</em> [2019] EWHC 3556 (Comm).</p><p>In relation to crypto-assets as property in other common law jurisdictions, see: </p><ul><li><em>Ruscoe v Cryptopia Ltd (In Liquidation)</em> [2020] NZHC 728 (New Zealand).</li><li><em>B2C2 Ltd v Quoine Pte Lrd  [2019] SGHC(I) 03</em>  (Singapore).</li></ul><p>For a detailed explanation as to the technical workings of Bitcoin, see  <em>Bitcoin: A Peer-to-Peer Electronic Cash System</em>, Nakomoto, 2008 (available <a href="https://bitcoin.org/bitcoin.pdf">here</a>).</p><p>Note: in an earlier version of this podcast, the exchange was unable to transfer Alice's bitcoin back to her because it did not have access to the fraudster's private keys. In practice, however, the majority of mainstream exchanges <em>do </em>control account holders' private keys (allowing them to treat "deposited" bitcoin as fungible). Therefore we have altered the scenario to reflect the more common case (albeit at the expense of illustrating a conundrum we think rather interesting!).</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This podcast explores the legal remedies that are available when Bitcoin are misappropriated, and some of the practical challenges of enforcement. For a more detailed analysis of the treatment of cryptoassets as property, see the Legal Statement on cryptoassets and smart contracts, November 2019, published by the LawTech Delivery Panel UK Jurisdiction Taskforce (downloadable <a href="https://35z8e83m1ih83drye280o9d1-wpengine.netdna-ssl.com/wp-content/uploads/2019/11/6.6056_JO_Cryptocurrencies_Statement_FINAL_WEB_111119-1.pdf">here</a>).</p><p>The legal basis for recovery of fraudulently misappropriated Bitcoin and factors that are engaged on an interim application are addressed in <em>AA v Persons Unkown, Re Bitcoin</em> [2019] EWHC 3556 (Comm).</p><p>In relation to crypto-assets as property in other common law jurisdictions, see: </p><ul><li><em>Ruscoe v Cryptopia Ltd (In Liquidation)</em> [2020] NZHC 728 (New Zealand).</li><li><em>B2C2 Ltd v Quoine Pte Lrd  [2019] SGHC(I) 03</em>  (Singapore).</li></ul><p>For a detailed explanation as to the technical workings of Bitcoin, see  <em>Bitcoin: A Peer-to-Peer Electronic Cash System</em>, Nakomoto, 2008 (available <a href="https://bitcoin.org/bitcoin.pdf">here</a>).</p><p>Note: in an earlier version of this podcast, the exchange was unable to transfer Alice's bitcoin back to her because it did not have access to the fraudster's private keys. In practice, however, the majority of mainstream exchanges <em>do </em>control account holders' private keys (allowing them to treat "deposited" bitcoin as fungible). Therefore we have altered the scenario to reflect the more common case (albeit at the expense of illustrating a conundrum we think rather interesting!).</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Oct 2020 12:26:27 +0100</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/53fbf7c5/67f6f811.mp3" length="30303699" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>756</itunes:duration>
      <itunes:summary>The legal nature of Bitcoin and the practicalities of recovering cryptoassets taken by fraud.</itunes:summary>
      <itunes:subtitle>The legal nature of Bitcoin and the practicalities of recovering cryptoassets taken by fraud.</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, bitcoin</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Is your bot talking $£!? about me again?</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Is your bot talking $£!? about me again?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0737524-aa6a-47fe-ae48-d4c8a4c08710</guid>
      <link>https://share.transistor.fm/s/69dfc892</link>
      <description>
        <![CDATA[<p>This podcast is intended as an introduction to issues that arise when an AI bot creates defamatory content. For detailed commentary on this specialist area of law, see: <em>Gatley on Libel and Slander </em>(12th Ed, 2017) and<em> Duncan and Neill on Defamation </em>(4th Ed, 2015 – with new addition forthcoming). For an overview, see our chapter on ‘Liability for Economic Harm’ in <em>The Law of Artificial Intelligence</em> (2020, forthcoming).</p><p><br>Cases relevant to auto-generated content include:<em> </em></p><ul><li><em>Bunt v Tilly </em>[2006] EWHC 407 (QB)</li><li><em>Metropolitan International Schools Ltd (trading as Skillstrain and/or Train2Game) v Designtechnica Corpn (trading as Digital Trends) and others</em> [2009] EWHC 1765 (QB)</li><li><em>Tamiz v Google Inc. </em>[2013] EWCA Civ 68 CA</li></ul><p>For other jurisdictions, see e.g. <em>Defteros v Google LLC</em> [2020] VSC 219 at [40], in which Richards J summarised the Australian position as follows: “<em>The Google search engine … is not a passive tool. It is designed by humans who work for Google to operate in the way that it does, and in such a way that identified objectionable content can be removed, by human intervention, from the search results that Google displays to a user</em>.”  For Hong Kong, see e.g. <em>Yeung v Google Inc. </em>[2014] HKCFI 1404; <em>Oriental Press Group Ltd v Fevaworks Solutions Ltd</em> [2013] HKFCA 47 (especially [76] for a test endorsed by the authors of <em>Gatley</em>).</p><p>On the contradictory positions taken by search engines worldwide, see, e.g., Sookman, “Is Google a publisher according to Google? The Google v Equustek and Duffy cases”, C.T.L.R. 2018, 24(1).</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This podcast is intended as an introduction to issues that arise when an AI bot creates defamatory content. For detailed commentary on this specialist area of law, see: <em>Gatley on Libel and Slander </em>(12th Ed, 2017) and<em> Duncan and Neill on Defamation </em>(4th Ed, 2015 – with new addition forthcoming). For an overview, see our chapter on ‘Liability for Economic Harm’ in <em>The Law of Artificial Intelligence</em> (2020, forthcoming).</p><p><br>Cases relevant to auto-generated content include:<em> </em></p><ul><li><em>Bunt v Tilly </em>[2006] EWHC 407 (QB)</li><li><em>Metropolitan International Schools Ltd (trading as Skillstrain and/or Train2Game) v Designtechnica Corpn (trading as Digital Trends) and others</em> [2009] EWHC 1765 (QB)</li><li><em>Tamiz v Google Inc. </em>[2013] EWCA Civ 68 CA</li></ul><p>For other jurisdictions, see e.g. <em>Defteros v Google LLC</em> [2020] VSC 219 at [40], in which Richards J summarised the Australian position as follows: “<em>The Google search engine … is not a passive tool. It is designed by humans who work for Google to operate in the way that it does, and in such a way that identified objectionable content can be removed, by human intervention, from the search results that Google displays to a user</em>.”  For Hong Kong, see e.g. <em>Yeung v Google Inc. </em>[2014] HKCFI 1404; <em>Oriental Press Group Ltd v Fevaworks Solutions Ltd</em> [2013] HKFCA 47 (especially [76] for a test endorsed by the authors of <em>Gatley</em>).</p><p>On the contradictory positions taken by search engines worldwide, see, e.g., Sookman, “Is Google a publisher according to Google? The Google v Equustek and Duffy cases”, C.T.L.R. 2018, 24(1).</p>]]>
      </content:encoded>
      <pubDate>Wed, 07 Oct 2020 14:39:55 +0100</pubDate>
      <author>Matthew Lavy &amp; Iain Munro</author>
      <enclosure url="https://media.transistor.fm/69dfc892/0239f56e.mp3" length="19565257" type="audio/mpeg"/>
      <itunes:author>Matthew Lavy &amp; Iain Munro</itunes:author>
      <itunes:duration>487</itunes:duration>
      <itunes:summary>Defamation by AI: who is liable and what defences are available?</itunes:summary>
      <itunes:subtitle>Defamation by AI: who is liable and what defences are available?</itunes:subtitle>
      <itunes:keywords>technology, law, techlaw, AI</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
