Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (6)
- Google (4)
- Information privacy (3)
- Internet (3)
- Social media (3)
-
- Consumer privacy (2)
- Cyberspace (2)
- Cyberspace law (2)
- Data mining (2)
- First Amendment (2)
- Fusion centers (2)
- Government (2)
- Invasion of privacy (2)
- Search engine (2)
- Agreements (1)
- American Law Institute (1)
- Antitrust (1)
- Artificial intelligence (1)
- Big Data (1)
- BitTorrent (1)
- Blocking (1)
- Censorship (1)
- Civil liberties (1)
- Civil rights (1)
- Clickstream data (1)
- Code is law (1)
- Comcast (1)
- Common carrier (1)
- Communication (1)
- Constitutional law (1)
- Publication Year
Articles 31 - 51 of 51
Full-Text Articles in Law
Mainstreaming Privacy Torts, Danielle Keats Citron
Mainstreaming Privacy Torts, Danielle Keats Citron
Faculty Scholarship
In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Faculty Scholarship
The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.
Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller
Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller
Proxy
No abstract provided.
Cyberspace Property Rights: Private Property Interests In The Context Of Internet Webpages, Taylor E. White
Cyberspace Property Rights: Private Property Interests In The Context Of Internet Webpages, Taylor E. White
Proxy
No abstract provided.
Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale
Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale
Faculty Scholarship
All is not well in the land of online self-regulation. However competently internet intermediaries police their sites, nagging questions will remain about their fairness and objectivity in doing so. Is Comcast blocking BitTorrent to stop infringement, to manage traffic, or to decrease access to content that competes with its own for viewers? How much digital due process does Google need to give a site it accuses of harboring malware? If Facebook censors a video of war carnage, is that a token of respect for the wounded or one more reflexive effort of a major company to ingratiate itself with the …
Privacy As Product Safety, James Grimmelmann
Privacy As Product Safety, James Grimmelmann
Faculty Scholarship
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.
Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …
The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann
The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann
Faculty Scholarship
For the past four years, Google has been systematically making digital copies of books in the collections of many major university libraries. It made the digital copies searchable through its web site--you couldn't read the books, but you could at least find out where the phrase you're looking for appears within them. This outraged copyright owners, who filed a class action lawsuit to make Google stop. Then, last fall, the parties to this large class action announced an even larger settlement: one that would give Google a license not only to scan books, but also to sell them.
The settlement …
How To Fix The Google Book Search Settlement, James Grimmelmann
How To Fix The Google Book Search Settlement, James Grimmelmann
Faculty Scholarship
The proposed settlement in the Google Book Search case should be approved with strings attached. The project will be immensely good for society, and the proposed deal is a fair one for Google, for authors, and for publishers. The public interest demands, however, that the settlement be modified first. It creates two new entities—the Books Rights Registry Leviathan and the Google Book Search Behemoth—with dangerously concentrated power over the publishing industry. Left unchecked, they could trample on consumers in any number of ways. We the public have a right to demand that those entities be subject to healthy, pro-competitive oversight, …
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Keats Citron
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Keats Citron
Faculty Scholarship
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Faculty Scholarship
Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.
After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Faculty Scholarship
Unaccountable power at any layer of online life can stifle innovation elsewhere. Dominant search engines rightly worry that carriers will use their control of the physical layer of internet infrastructure to pick winners among content and application providers. Though they advocate net neutrality, they have been much less quick to recognize the threat to openness and fair play their own practices may pose.
Just as dominant search engines fear an unfairly tiered online world, they should be required to provide access to their archives and indices in a nondiscriminatory manner. If dominant search engines want carriers to disclose their traffic …
The Google Dilemma, James Grimmelmann
Accidental Privacy Spills, James Grimmelmann
Accidental Privacy Spills, James Grimmelmann
Faculty Scholarship
No abstract provided.
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Reservoirs Of Danger: The Evolution Of Public And Private Law At The Dawn Of The Information Age, Danielle Keats Citron
Faculty Scholarship
A defining problem at the dawn of the Information Age will be securing computer databases of ultra-sensitive personal information. These reservoirs of data fuel our Internet economy but endanger individuals when their information escapes into the hands of cyber-criminals. This juxtaposition of opportunities for rapid economic growth and novel dangers recalls similar challenges society and law faced at the outset of the Industrial Age. Then, reservoirs collected water to power textile mills: the water was harmless in repose but wrought havoc when it escaped. After initially resisting Rylands v. Fletcher’s strict liability standard as undermining economic development, American courts …
The Structure Of Search Engine Law, James Grimmelmann
The Structure Of Search Engine Law, James Grimmelmann
Faculty Scholarship
This Article provides a road map to issues of search engine law. It indicates what questions we must consider when thinking about search engines, and it indicates the interconnections among those questions. It does not endorse any particular normative framework for search. Nor does it recommend who should regulate search. Instead, it provides the necessary foundation for informed decision-making, by whatever regulator and whatever its normative approach.
Part I will explain how modern search engines function and describe the business environment within which they operate. Search engine operations can be understood in terms of the information flows among four principal …
Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello
Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello
Faculty Scholarship
This article reviews recent developments in the United States and the European Union involving Internet transactions. It describes those developments and analyzes both from a normative and practical perspective.
"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin
"Defendant Veto" Or "Totality Of The Circumstances?": It's Time For The Supreme Court To Straighten Out The Personal Jurisdiction Standard Once Again, Robert J. Condlin
Faculty Scholarship
Commentators frequently claim that there is no single, coherent doctrine of extra-territorial personal jurisdiction, and, unfortunately, they are correct. The International Shoe case, commonly (but inaccurately) thought of as the wellspring of the modern form of the doctrine, announced a relatively straightforward, two-factor, four-permutation test that worked well for resolving most cases. In the nearly sixty-year period following Shoe, however, as the Supreme Court expanded and refined the standard, what was once straightforward and uncomplicated became serendipitous and convoluted. Two general, and generally incompatible, versions of the doctrine competed for dominance. The first, what might best be described as …
Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky
Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky
Faculty Scholarship
This paper addresses the collection of "clickstream data," and sets forth a theory about the legal rules that should govern it. At the outset, I propose a typology for categorizing privacy invasions. A given state of informational privacy may be represented by: the observed behavior, the collecting agent, and the searching agent. Using this typology, I identify the specific sources of concern about collection of clickstream data. Then, based on expected levels of utility and expected transaction costs of "flipping" to a different rule, I argue for a particular set of privacy defaults for data mining.
"Greening" The Constitution - Harmonizing Environmental And Constitutional Values, Robert V. Percival
"Greening" The Constitution - Harmonizing Environmental And Constitutional Values, Robert V. Percival
Faculty Scholarship
No abstract provided.