Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Entire DC Network
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Michigan Journal of International Law
The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Cynthia R. Farina
This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Michele R. Pistone
1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass
Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass
Loyola of Los Angeles Law Review
Autonomous weapons are increasingly used by militaries around the world. Unlike conventional unmanned weapons such as drones, autonomous weapons involve a machine deciding whether to deploy lethal force. Yet, because a machine cannot have the requisite mental state to commit a war crime, the legal scrutiny falls onto the decision to deploy an autonomous weapon. This Article focuses on the dual questions arising from that decision: how to regulate autonomous weapon use and who should be held criminally liable for an autonomous weapon’s actions. Regarding the first issue, this Article concludes that regulations expressly limiting autonomous weapon use to non-human …
The Fda And The Rise Of The Empowered Patient, Lewis Grossman
The Fda And The Rise Of The Empowered Patient, Lewis Grossman
Contributions to Books
No abstract provided.
Secondary Data: A Primary Concern, Kelsey L. Zottnick
Secondary Data: A Primary Concern, Kelsey L. Zottnick
Vanderbilt Journal of Entertainment & Technology Law
This Note addresses privacy concerns implicated by rising secondary data mining. Secondary data mining is the use of personal information for a purpose other than the original. This complex technology drives billions of dollars in commercial industry yet remains largely unregulated. This Note examines the current state of the data mining industry and the behavioral fallacies that belie societal concerns about online privacy. Further, relevant federal, state, and constitutional laws appear outstripped by these technological advances. An analysis of potential privacy solutions examines the advantages and disadvantages of implementing each one through the privacy community, the federal government, and the …
Campbell At 21/Sony At 31, Jessica D. Litman
Campbell At 21/Sony At 31, Jessica D. Litman
Articles
When copyright lawyers gather to discuss fair use, the most common refrain is its alarming expansion. Their distress about fair use’s enlarged footprint seems completely untethered from any appreciation of the remarkable increase in exclusive copyright rights. In the nearly forty years since Congress enacted the 1976 copyright act, the rights of copyright owners have expanded markedly. Copyright owners’ demands for further expansion continue unabated. Meanwhile, they raise strident objections to proposals to add new privileges and exceptions to the statute to shelter non-infringing uses that might be implicated by their expanded rights. Copyright owners have used the resulting uncertainty …
Internet Freedom With Teeth, Charles Duan
Internet Freedom With Teeth, Charles Duan
Articles in Law Reviews & Other Academic Journals
"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."
So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …
The Anti-Innovators: How Special Interests Undermine Entrepreneurship, James Bessen
The Anti-Innovators: How Special Interests Undermine Entrepreneurship, James Bessen
Faculty Scholarship
For much of the last century, the United States led the world in technological innovation-a position it owed in part to well-designed procurement programs at the Defense Department and NASA. During the 1940s, for example, the Pentagon funded the construction of the first general-purpose computer, designed initially to calculate artillery-firing tables for the U.S. Army. Two decades later, it developed the data communications network known as the ARPANET, a precursor to the Internet. Yet not since the 1980s have government contracts helped generate any major new technologies, despite large increases in funding for defense-related R & D. One major culprit …
From Anonymity To Identification, A. Michael Froomkin
From Anonymity To Identification, A. Michael Froomkin
Articles
This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Robots In The Home: What Will We Have Agreed To?, Margot E. Kaminski
Publications
A new technology can expose the cracks in legal doctrine. Sometimes a technology resists analogy. Sometimes, through analogies, it reveals inconsistencies in the law, or basic flaws in framing, or in the fit between different parts of the legal system. This Essay addresses robots in the home, and what they reveal about U.S. privacy law. Household robots might not themselves uproot U.S. privacy law, but they will reveal its inconsistencies, and show where it is most likely to fracture. Just as drones are serving as a legislative “privacy catalyst” — encouraging the enactment of new privacy laws as people realize …
Participatory Fact-Finding: Developing New Directions For Human Rights Investigations Through New Technologies, Molly Land
Molly K. Land
This chapter considers the way in which broader participation in human rights fact-finding, enabled by the introduction of new technologies, will change the nature of fact-finding itself. Using the example of a participatory mapping project called Map Kibera, the chapter argues that new technologies will change human rights fact-finding by providing opportunities for ordinary individuals to investigate the human rights issues that affect them. Those who were formerly the ‘subjects’ of human rights investigations now have the potential to be agents in their own right. This ‘participatory fact-finding’ may not be as effective in ‘naming and shaming’ states and companies …
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Lori B. Andrews