 {"id":284,"date":"2019-07-15T12:35:11","date_gmt":"2019-07-15T12:35:11","guid":{"rendered":"https:\/\/live-cornell-law-review.pantheonsite.io\/?p=284"},"modified":"2019-07-15T12:35:11","modified_gmt":"2019-07-15T12:35:11","slug":"the-paradox-of-source-code-secrecy","status":"publish","type":"post","link":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/2019\/07\/15\/the-paradox-of-source-code-secrecy\/","title":{"rendered":"The Paradox of Source Code Secrecy"},"content":{"rendered":"\n<p>Today,&nbsp;the&nbsp;government relies on machine learning and AI in predictive policing analysis, family court delinquency proceedings, parole decisions, and DNA and forensic science techniques, among other areas, producing a fundamental conflict between civil rights and automated decisionmaking. Ground zero for this conflict, I argue, has&nbsp;become&nbsp;the&nbsp;murky, messy intersection between software, trade secrecy, and public governance. In many cases&nbsp;of&nbsp;automated decisionmaking, algorithms \u2013 and&nbsp;the&nbsp;source code that informs them, are hidden from public view, even though they implicate core&nbsp;constitutional&nbsp;protections&nbsp;of&nbsp;due process, individualized justice and equal protection. However, because they are often protected as trade secrets, they can remain entirely free from public scrutiny.<\/p>\n\n\n\n<p>This article argues that&nbsp;the&nbsp;constitutionally-inflected conflict that we now face is, in no small part, attributable to a core failure&nbsp;of&nbsp;our system&nbsp;of&nbsp;intellectual property to address, definitively,&nbsp;the&nbsp;boundaries&nbsp;of&nbsp;software protection and&nbsp;the&nbsp;implications for source code secrecy. In a world&nbsp;of&nbsp;privatized decisionmaking,&nbsp;the&nbsp;largely consistent move towards closed code in software sectors, has a number&nbsp;of&nbsp;deleterious results for&nbsp;the&nbsp;public, particularly in&nbsp;the&nbsp;age&nbsp;of&nbsp;algorithmic dominance. However, this Article argues that source code also carries a paradoxical character that is peculiar to software:&nbsp;the&nbsp;very substance&nbsp;of&nbsp;what is secluded often stems from&nbsp;the&nbsp;most public&nbsp;of&nbsp;origins, and often produces&nbsp;the&nbsp;most public&nbsp;ofimplications. And it is&nbsp;the&nbsp;failures&nbsp;of&nbsp;intellectual property&nbsp;law&nbsp;that has made this possible. First, as I show, courts have shifted&nbsp;the&nbsp;boundaries&nbsp;of&nbsp;protection for software under both copyright and patent&nbsp;law, further amplifying&nbsp;the&nbsp;attractiveness&nbsp;of&nbsp;trade secrecy. Second,&nbsp;the law&nbsp;has been willing to entertain&nbsp;a&nbsp;unique\u2014and paradoxical\u2014overlap between copyright, patent, and trade secrecy, even though&nbsp;the&nbsp;three regimes have opposing public goals. Copyright and patent&nbsp;law&nbsp;are oriented towards disclosure, trade secrecy&nbsp;the&nbsp;opposite. While this overlap&nbsp;of&nbsp;protection in software seemed, at first glance, to be a good thing for innovation policy, it has proven deleterious for&nbsp;the&nbsp;larger public, particularly criminal defendants and lower income populations, who are now increasingly governed by&nbsp;aninvisible hand that they can no longer investigate or question. But, as I argue, it may also be deleterious for other innovators, as well.&nbsp;The&nbsp;Article concludes with a brief discussion&nbsp;ofways to offer greater transparency through a &#8220;controlled disclosure regime,&#8221; offering areas&nbsp;ofreform in intellectual property, contract&nbsp;law, and discovery.<\/p>\n\n\n\n<p><em>To read more, click here: <a href=\"https:\/\/live-cornell-law-review.pantheonsite.io\/wp-content\/uploads\/2020\/05\/Katyal-final.pdf\">The Paradox of Source Code Secrecy<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today,&nbsp;the&nbsp;government relies on machine learning and AI in predictive policing analysis, family court delinquency proceedings, parole decisions, and DNA and forensic science techniques, among other areas, producing a fundamental conflict between civil rights and automated decisionmaking. Ground zero for this conflict, I argue, has&nbsp;become&nbsp;the&nbsp;murky, messy intersection between software, trade secrecy, and public governance. In many&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13,14,92,49],"tags":[139,491,607,608,649],"class_list":["post-284","post","type-post","status-publish","format-standard","hentry","category-archives","category-articles","category-issue-5","category-print-volume-104","tag-artificial-intelligence","tag-oracle-v-google","tag-software","tag-source-code","tag-trade-secrets"],"acf":[],"_links":{"self":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/posts\/284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":0,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"wp:attachment":[{"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/publications.lawschool.cornell.edu\/lawreview\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}