{"id":6602,"date":"2020-01-21T17:22:00","date_gmt":"2020-01-21T17:22:00","guid":{"rendered":"https:\/\/journals.law.unc.edu\/jolt\/?page_id=6602"},"modified":"2026-04-07T20:53:53","modified_gmt":"2026-04-07T20:53:53","slug":"home-page","status":"publish","type":"page","link":"https:\/\/journals.law.unc.edu\/ncjolt\/","title":{"rendered":"NC JOLT"},"content":{"rendered":"\n<div class=\"wp-block-cover is-position-center-center\" style=\"min-height:535px\"><span aria-hidden=\"true\" class=\"has-background-dim-40 wp-block-cover__gradient-background has-background-dim\"><\/span><img loading=\"lazy\" width=\"768\" height=\"512\" class=\"wp-block-cover__image-background wp-image-7930\" alt=\"\" src=\"http:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/07\/UNC-South-Building.jpg\" style=\"object-position:52% 90%\" data-object-fit=\"cover\" data-object-position=\"52% 90%\" srcset=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/07\/UNC-South-Building.jpg 768w, https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/07\/UNC-South-Building-300x200.jpg 300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><div class=\"wp-block-cover__inner-container\">\n<h3 class=\"has-text-align-center has-white-color has-text-color\" style=\"font-size:86px\"><strong>The North Carolina Journal of Law and Technology<\/strong><\/h3>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<h2 class=\"has-text-align-center has-large-font-size\"><strong>From Our Spring 2026 Issues<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Combined-Cover-and-Front-Matter.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Combined-Cover-and-Front-Matter.pdf\">Volume 27, Issue 3 Cover<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Article_COOK_Final.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Article_COOK_Final.pdf\">Assessing Risk &amp; Protecting Personal Data: An EU Approach to Artificial Intelligence as a Model for the A.B.A.\u2019s Model Rules<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Jennifer J. Cook<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Ciolli_Final_V4.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Ciolli_Final_V4.pdf\">Judicial Security in the Data Economy<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Anthony M. Ciolli<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Third-Party-Privacy-Problem-Final_V2.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Third-Party-Privacy-Problem-Final_V2.pdf\">The Third-Party Privacy Problem<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">David Sella-Villa<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Browning_Final.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/04\/Browning_Final.pdf\">Stealing Hearts, and Data: Legal Ramifications and Data Privacy Risks of AI Companions<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Hon. John G. Browning<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-large-font-size\"><strong>From Our Fall 2025 Issues<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/Volume-27-Issue-2-Cover-Combined112525.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/Volume-27-Issue-2-Cover-Combined112525.pdf\">Volume 27, Issue 2 Cover<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/NOTE_Greeno_To_Publish_Final11.24.25.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/NOTE_Greeno_To_Publish_Final11.24.25.pdf\">Take It Down or Take It Too Far? The Legal Fallout of New Online Takedown Powers<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Taylor Greeno<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/NOTE_Speirs_To_Publish_Final11.25.25.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/NOTE_Speirs_To_Publish_Final11.25.25.pdf\">Code as Counselor: How Robo-Will Platforms Are Productizing Estate Planning Services<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">John Speirs<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/Note_Vora_to_Publish11.26.25_Final.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/Note_Vora_to_Publish11.26.25_Final.pdf\">Piggy Banks to Paychecks: Ensuring Child Content Creators\u2019 Protection Against Financial Exploitation by Parents and Guardians<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Spencer S. Vora <\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/Note_Pedro_To_Publish_READY_11.26.25.pdf\" data-type=\"URL\" data-id=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/11\/Note_Pedro_To_Publish_READY_11.26.25.pdf\">If You Love Something, Let It Go: Giving Up Government Mandated Online Age Restrictions in Favor of \u00a7 230 Inspired Immunity<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Cole Pedro<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><strong><mark class=\"has-inline-color has-burgundy-color\"> <\/mark><\/strong><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/10\/Volume-27-Issue-Final-Cover-10.23.25-combined.pdf\">Volume 27, Issue 1 Cover<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/10\/EPapadaki_Can-AI-Empower-the-Rule-of-Law_Publish.pdf\"><em>Can AI Empower the Rule of Law?<\/em><\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\">Eleftheria Papadaki<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/10\/Conley_Competence-GAI_GO.pdf\">Understanding the Duty of Competence for Attorneys Using Generative AI<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Anna Conley<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/10\/Do_Selvadurai_Publish_GO.pdf\">Future Crime: A Theoretical Foundation for Designing Effective Cybercrime Laws in the Age of AI and Ransomware<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Thi Ha Do &amp; Niloufer Selvadurai<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em><a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2025\/10\/Ganot_ScientificMuse_Publish_Go.pdf\">Scientific Muse and Misuse: Reevaluating Authorship Attribution and Liability Allocation in the Generative AI Age<\/a><\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\">Inbar Cohen Ganot<\/p>\n\n\n\n<p> <\/p>\n\n\n\n<p> <\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background has-dark-blue-background-color has-dark-blue-color is-style-wide\" \/>\n\n\n\n<div class=\"wp-container-1 wp-block-group\"><div class=\"wp-block-group__inner-container\"><\/div><\/div>\n<\/div>\n<\/div>\n\n\n<section class=\"ribbon-block\"><div class=\"\"><header class=\"dark-blue ribbon\">From the Blog<\/header><\/div><\/section>\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:100%\"><section class=\"slider-block rotate\"><div class=\"slider-container\"><div class=\"slider-content\"><div class=\"slides\">            <div class=\"slide\">\n                <img class=\"special\" src=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/03\/Williams.jpg\" alt=\"\">\n                <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/when-sterilization-turns-toxic-the-current-deregulation-of-ethylene-oxide\/\" class=\"sr-only\">When Sterilization Turns Toxic: The Current Deregulation of Ethylene Oxide<\/a>\n            <\/div>            <div class=\"slide\">\n                <img class=\"special\" src=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/02\/Winget-2-scaled.jpg\" alt=\"\">\n                <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/compounding-the-problem-how-telehealth-platforms-used-a-compounding-exception-to-make-copies-of-popular-glp-1-weight-loss-drugs\/\" class=\"sr-only\">Compounding the Problem: How Telehealth Platforms Used a Compounding Exception to Make Copies of Popular GLP-1 Weight-loss Drugs<\/a>\n            <\/div>            <div class=\"slide\">\n                <img class=\"special\" src=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/02\/Seckinger.jpg\" alt=\"\">\n                <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/when-it-rains-it-pours-ai-data-centers-and-water-consumption\/\" class=\"sr-only\">When It Rains, It Pours: AI Data Centers and Water Consumption<\/a>\n            <\/div>            <div class=\"slide\">\n                <img class=\"special\" src=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2026\/02\/Vora.jpg\" alt=\"\">\n                <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/social-media-companies-face-landmark-child-safety-litigation-drawing-historical-comparisons-to-big-tobacco\/\" class=\"sr-only\">Social Media Companies Face Landmark Child Safety Litigation, Drawing Historical Comparisons to Big Tobacco<\/a>\n            <\/div><\/div><\/div>    <div class=\"slider-controls\" aria-hidden=\"true\">\n        <a class=\"slider-title\" href=\"#\"><\/a>\n        <a href=\"#\" class=\"slider-control prev\" aria-label=\"Previous slide button\"><i class=\"fas fa-chevron-left\"><\/i><\/a>\n        <a href=\"#\" class=\"slider-control next\" aria-label=\"Next slide button\"><i class=\"fas fa-chevron-right\"><\/i><\/a>\n        <span class=\"slider-dots\"><span class=\"dot\"><\/span><span class=\"dot\"><\/span><span class=\"dot\"><\/span><span class=\"dot\"><\/span><\/span>\n    <\/div><\/div><\/section><\/div>\n\n\n\n<div class=\"wp-block-column\" style=\"flex-basis:22.1%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-container-2 wp-block-group\"><div class=\"wp-block-group__inner-container\"><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>From Our Spring 2026 Issues Volume 27, Issue 3 Cover Assessing Risk &amp; Protecting Personal Data: An EU Approach to Artificial Intelligence as a Model for the A.B.A.\u2019s Model Rules Jennifer J. Cook Judicial Security in the Data Economy Anthony M. Ciolli The Third-Party Privacy Problem David Sella-Villa Stealing Hearts, and Data: Legal Ramifications and <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-narrowwidthhome.php","meta":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/pages\/6602"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=6602"}],"version-history":[{"count":63,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/pages\/6602\/revisions"}],"predecessor-version":[{"id":9797,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/pages\/6602\/revisions\/9797"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=6602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}