Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Law

Artificial Intelligence And Trade, Anupam Chander Jan 2021

Artificial Intelligence And Trade, Anupam Chander

Georgetown Law Faculty Publications and Other Works

Artificial Intelligence is already powering trade today. It is crossing borders, learning, making decisions, and operating cyber-physical systems. It underlies many of the services that are offered today – from customer service chatbots to customer relations software to business processes. The chapter considers AI regulation from the perspective of international trade law. It argues that foreign AI should be regulated by governments – indeed that AI must be ‘locally responsible’. The chapter refutes arguments that trade law should not apply to AI and shows how the WTO agreements might apply to AI using two hypothetical cases . The analysis reveals …


Storming Zuckerberg’S Castle, Anupam Chander Jan 2021

Storming Zuckerberg’S Castle, Anupam Chander

Georgetown Law Faculty Publications and Other Works

A company’s server is its castle, Richard Epstein once declared. Because of this, anyone sending an email to that server needs permission to enter. Within its own logic, this seems incontrovertible, but it depends on a few logical steps worth unpacking. It begins with the premise that a man’s home is his castle. (The masculine pronoun in the early formulation seems relevant.) Let us accept that premise for the purpose of argument. Combining this premise with the investiture of legal personhood on a corporation, we might then deduce that a company’s home must be its castle. Finally, combining that …


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz Apr 2020

The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz

Georgetown Law Faculty Publications and Other Works

The International Intellectual Property Commercialization Council (“IIPCC”) presented its third annual policy conference at the United States Capitol on May 6, 2019. The conference’s theme explored the question of “what is the state of innovation in the United States?” Panelists included The Honorable Andrei Iancu – Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office; Dr. Carl J. Schramm – University Professor, Syracuse University and Former President of the Ewing Marion Kauffman Foundation; Mr. Patrick Kilbride – Senior Vice President of the Global Innovation Policy Center (“GIPC”) at the U.S. Chamber of …


New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue Mar 2020

New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

New media facilitates communication and creates a common, lived experience. It also carries the potential for great harm on an individual and societal scale. Posting integrates information and emotion, with study after study finding that fear and anger transfer most readily online. Isolation follows, with insular groups forming. The result is an increasing bifurcation of society. Scholars also write about rising levels of depression and suicide that stem from online dependence and replacing analogical experience with digital interaction, as well as escalating levels of anxiety that are rooted in the validation expectation of the ‘like’ function. These changes generate instability …


Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll Jan 2020

Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

Journalists see the First Amendment as an amulet, and with good reason. It has long protected the Fourth Estate—an independent institutional press—in its exercise of editorial discretion to check government power. This protection helped the Fourth Estate flourish in the second half of the twentieth century and ably perform its constitutional watchdog role.

But in the last two decades, the media ecology has changed. The Fourth Estate has been subsumed by a Networked Press in which journalists are joined by engineers, algorithms, audience, and other human and non-human actors in creating and distributing news. The Networked Press’s most powerful members …


Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder Aug 2019

Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder

Georgetown Law Faculty Publications and Other Works

The quarter century since Barlow’s writing allows us to assess his prophecy. The economy moved in the very direction that Barlow anticipated—from an economy focused on the ownership of things to an economy based on services and experiences. In high-income countries, services now account for three-quarters of the gross domestic product.

But intellectual property proved more resilient and adaptable than Barlow predicted. Intellectual property law both offered exceptions where necessary, while simultaneously expanding to cover new forms of creativity and activities. In this short essay, we argue that, for good or ill, intellectual property has reconfigured itself for an economy …


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell Jan 2017

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids app …


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …


After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole Jan 2016

After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole

Georgetown Law Faculty Publications and Other Works

Imagine a state that compels its citizens to inform it at all times of where they are, who they are with, what they are doing, who they are talking to, how they spend their time and money, and even what they are interested in. None of us would want to live there. Human rights groups would condemn the state for denying the most basic elements of human dignity and freedom. Student groups would call for boycotts to show solidarity. We would pity the offending state's citizens for their inability to enjoy the rights and privileges we know to be essential …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


Configuring The Networked Citizen, Julie E. Cohen Jan 2012

Configuring The Networked Citizen, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Among legal scholars of technology, it has become commonplace to acknowledge that the design of networked information technologies has regulatory effects. For the most part, that discussion has been structured by the taxonomy developed by Lawrence Lessig, which classifies "code" as one of four principal regulatory modalities, alongside law, markets, and norms. As a result of that framing, questions about the applicability of constitutional protections to technical decisions have taken center stage in legal and policy debates. Some scholars have pondered whether digital architectures unacceptably constrain fundamental liberties, and what "public" design obligations might follow from such a conclusion. Others …


Hybrid Vigor: Mashups, Cyborgs, And Other Necessary Monsters, Rebecca Tushnet Jan 2010

Hybrid Vigor: Mashups, Cyborgs, And Other Necessary Monsters, Rebecca Tushnet

Georgetown Law Faculty Publications and Other Works

Does remix matter? This brief comment addresses the critique of importance, arguing that remix culture as well as the popular/mass culture from which it springs are of vital importance to human flourishing, invoking Donna Haraway's concept of the cyborg to investigate the fluidity, dynamism, and monstrousness of remixes and remixers.


Questioning Cultural Commons, Lawrence B. Solum Jan 2010

Questioning Cultural Commons, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

In Constructing Commons in the Cultural Environment, Michael J. Madison, Brett M. Frischmann, and Katherine J. Strandburg offer an innovative and attractive vision of the future of cultural and scientific knowledge through the construction of “cultural commons,” which they define as “environments for developing and distributing cultural and scientific knowledge through institutions that support pooling and sharing that knowledge in a managed way.” The kind of “commons” they have in mind is modeled on the complex arrangement of social norms that allocate lobstering rights among fishermen in Maine and extends to arrangements such as patent pools, open-source software development …


Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen Jan 2008

Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of visibility has created two problems. First, focusing on visibility diminishes the salience and obscures the operation of nonvisual mechanisms designed to render individual identity, behavior, and preferences transparent to third parties. The metaphoric mapping to visibility suggests that surveillance is simply passive observation, rather than the active production of categories, narratives, and, norms. Second, even a broader conception of privacy harms as a function …


Network Stories, Julie E. Cohen Jan 2007

Network Stories, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In 1962, Rachel Carson named the natural environment. Scientists were beginning to understand the complex web of ecological cause and effect; naming that web gave it independent existence and invested that existence with political meaning. In 1996, James Boyle named the cultural environment. Boyle’s act of naming was intended to jumpstart a political movement by appropriating the complex web of political meaning centered on the interdependency of environmental resources.

But naming, although important, is only a beginning. The example of the natural environment shows us that to build from a name to a movement requires two things. First, you have …


Cyberspace As/And Space, Julie E. Cohen Jan 2007

Cyberspace As/And Space, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …


Pervasively Distributed Copyright Enforcement, Julie E. Cohen Jan 2006

Pervasively Distributed Copyright Enforcement, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …


The Future Of Copyright, Lawrence B. Solum Jan 2005

The Future Of Copyright, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

Review of Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity by Lawrence Lessig (2004).

Sometimes technological change is so profound that it rocks the foundations of an entire body of law. Peer-to-peer (P2P) filesharing systems--Napster, Gnutella, KaZaA, Grokster, and Freenet3--are mere symptoms of a set of technological innovations that have set in motion an ongoing process of fundamental changes in the nature of copyright law. The video tape recorder begat the Sony substantial noninfringing use defense. The digital cassette recorder begat the Audio Home Recording Act. The internet begat the Digital …


Uncle Sam Is Watching You, David Cole Nov 2004

Uncle Sam Is Watching You, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Digital Architecture As Crime Control, Neal K. Katyal Jan 2003

Digital Architecture As Crime Control, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House's recent proposals on cybersecurity.

The paper begins by introducing four concepts of …


Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen Jan 2001

Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000).

Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen …


Criminal Law In Cyberspace, Neal K. Katyal Jan 2001

Criminal Law In Cyberspace, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

Two of the most talked-about crimes of the year, the ILoveYou computer worm and the denial of service attacks on Yahoo, eBay, and ETrade, suggest that a new form of crime is emerging: cybercrime. Thousands of these crimes occur each year, and the results are often catastrophic; in terms of economic damage, the ILoveYou worm may have been the most devastating crime in history, causing more than $11 billion in losses.

This paper asks how cybercrime is best deterred. It identifies five constraints on crime - legal sanctions, monetary perpetration cost, social norms, architecture, and physical risks - and explains …


Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen Jan 2000

Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests. On a theoretical level, data processors and other data privacy opponents argue that imposing restrictions on the collection, use, and exchange of personal data would ignore established understandings of property, limit individual freedom of choice, violate principles of rational information use, and infringe data processors' freedom of speech. In this article, Professor Julie Cohen explores these theoretical challenges to informational privacy protection. She concludes that categorical arguments from property, choice, truth, and speech lack weight, and mask …


Lochner In Cyberspace: The New Economic Orthodoxy Of "Rights Management", Julie E. Cohen Jan 1998

Lochner In Cyberspace: The New Economic Orthodoxy Of "Rights Management", Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Part I of this Article describes the economic models now proffered as the basis for defining rights in digital works, and explores their striking resemblance to the system of social ordering described and advanced in the Supreme Court's Lochner-era decisions. The ghost of Lochner is not invoked lightly, nor with intent to belittle. Lochner represented a particular ideal of social ordering, premised on a seamless convergence of the private-law institutions of property and contract to provide a zone of legal insulation for market outcomes. In the physical world, that vision has long been compromised by evidence of market failures …


Some Reflections On Copyright Management Systems And Laws Designed To Protect Them, Julie E. Cohen Jan 1997

Some Reflections On Copyright Management Systems And Laws Designed To Protect Them, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Copyright management systems (CMS)—technologies that enable copyright owners to regulate reliably and charge automatically for access to digital works—are the wave of the very near future. The advent of digital networks, which make copying and distribution of digital content quick, easy, and undetectable, has provided the impetus for CMS research and development. CMS are premised on the concept of "trusted systems" or "secure digital envelopes" that protect copyrighted content and allow access and subsequent copying only to the extent authorized by the copyright owner. Software developers are testing prototype systems designed to detect, prevent, count, and levy precise charges for …


A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen Jan 1996

A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader’s paradise—an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are enabling information providers to amass an unprecedented wealth of data about who their customers are and what they like to read. In the new …