Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Business Organizations Law

University of Colorado Law School

First Amendment

Publication Year

Articles 1 - 3 of 3

Full-Text Articles in Law

Corporations As Conduits: A Cautionary Note About Regulating Hypotheticals, Douglas M. Spencer Jan 2018

Corporations As Conduits: A Cautionary Note About Regulating Hypotheticals, Douglas M. Spencer

Publications

No abstract provided.


(At Least) Thirteen Ways Of Looking At Election Lies, Helen Norton Jan 2018

(At Least) Thirteen Ways Of Looking At Election Lies, Helen Norton

Publications

Lies take many forms. Because lies vary so greatly in their motivations and consequences (among many other qualities), philosophers have long sought to catalog them to help make sense of their diversity and complexity. Legal scholars too have classified lies in various ways to explain why we punish some and protect others. This symposium essay offers yet another taxonomy of lies, focusing specifically on election lies — that is, lies told during or about elections. We can divide and describe election lies in a wide variety of ways: by speaker, by motive, by subject matter, by audience, by means of …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …