Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron Jan 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Faculty Scholarship

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.

In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …


What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2010

What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Jan 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Mainstreaming Privacy Torts, Danielle Keats Citron Jan 2010

Mainstreaming Privacy Torts, Danielle Keats Citron

Faculty Scholarship

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Cyber Civil Rights: Looking Forward, Danielle Keats Citron Jan 2010

Cyber Civil Rights: Looking Forward, Danielle Keats Citron

Faculty Scholarship

The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.


Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller Jan 2010

Legal Implications Of The Use Of Social Media: Minimizing The Legal Risks For Employers And Employees, Damian R. Laplaca, Noah Winkeller

Proxy

No abstract provided.


Cyberspace Property Rights: Private Property Interests In The Context Of Internet Webpages, Taylor E. White Jan 2010

Cyberspace Property Rights: Private Property Interests In The Context Of Internet Webpages, Taylor E. White

Proxy

No abstract provided.


Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale Jan 2010

Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale

Faculty Scholarship

All is not well in the land of online self-regulation. However competently internet intermediaries police their sites, nagging questions will remain about their fairness and objectivity in doing so. Is Comcast blocking BitTorrent to stop infringement, to manage traffic, or to decrease access to content that competes with its own for viewers? How much digital due process does Google need to give a site it accuses of harboring malware? If Facebook censors a video of war carnage, is that a token of respect for the wounded or one more reflexive effort of a major company to ingratiate itself with the …


Privacy As Product Safety, James Grimmelmann Jan 2010

Privacy As Product Safety, James Grimmelmann

Faculty Scholarship

Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …


Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Jan 2010

Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Maryland Law Review

No abstract provided.


Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm Jan 2010

Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm

Maryland Law Review

No abstract provided.


Bloodsucking Copyrights , Ann Bartow Jan 2010

Bloodsucking Copyrights , Ann Bartow

Maryland Law Review

No abstract provided.