Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Social media (3)
- Digital copyright (2)
- Government (2)
- Information privacy (2)
- American Law Institute (1)
-
- BitTorrent (1)
- Blocking (1)
- Civil rights (1)
- Comcast (1)
- Constitutional law (1)
- Constitutional theory (1)
- Cyber crime (1)
- Cyberlaw (1)
- Cyberspace law (1)
- Digital (1)
- Discrimination (1)
- Email (1)
- FCC (1)
- FTC (1)
- First Amendment (1)
- Forms of expression (1)
- Free speech (1)
- Harrassment (1)
- IIRC (1)
- Internet (1)
- Invasion of privacy (1)
- Licensing (1)
- Privacy (1)
- Regulatory (1)
- Social networks (1)
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in Law
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Faculty Scholarship
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.
In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …
What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds
What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Mainstreaming Privacy Torts, Danielle Keats Citron
Mainstreaming Privacy Torts, Danielle Keats Citron
Faculty Scholarship
In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Faculty Scholarship
The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.
Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller
Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller
Proxy
No abstract provided.
Cyberspace Property Rights: Private Property Interests In The Context Of Internet Webpages, Taylor E. White
Cyberspace Property Rights: Private Property Interests In The Context Of Internet Webpages, Taylor E. White
Proxy
No abstract provided.
Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale
Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale
Faculty Scholarship
All is not well in the land of online self-regulation. However competently internet intermediaries police their sites, nagging questions will remain about their fairness and objectivity in doing so. Is Comcast blocking BitTorrent to stop infringement, to manage traffic, or to decrease access to content that competes with its own for viewers? How much digital due process does Google need to give a site it accuses of harboring malware? If Facebook censors a video of war carnage, is that a token of respect for the wounded or one more reflexive effort of a major company to ingratiate itself with the …
Privacy As Product Safety, James Grimmelmann
Privacy As Product Safety, James Grimmelmann
Faculty Scholarship
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.
Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Maryland Law Review
No abstract provided.
Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm
Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm
Maryland Law Review
No abstract provided.
Bloodsucking Copyrights , Ann Bartow