Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Law

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius Oct 2022

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius

Homeland Security Publications

No abstract provided.


What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius Oct 2018

What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Sexual Privacy, Danielle Keats Citron Jan 2018

Sexual Privacy, Danielle Keats Citron

Faculty Scholarship

Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.

At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …


Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell Jan 2018

Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell

Faculty Scholarship

No abstract provided.


Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale Jan 2017

Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Automated Public Sphere, Frank A. Pasquale Jan 2017

The Automated Public Sphere, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank A. Pasquale Jan 2016

Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron Jan 2016

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius Oct 2015

The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker Oct 2015

Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Anarchy, Status Updates, And Utopia, James Grimmelmann Jan 2015

Anarchy, Status Updates, And Utopia, James Grimmelmann

Faculty Scholarship

Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; Paypal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.

Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power there is also social power. Whenever people come together …


The Virtues Of Moderation, James Grimmelmann Jan 2015

The Virtues Of Moderation, James Grimmelmann

Faculty Scholarship

TL;DR—On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.

The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town meetings …


Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale Jan 2015

Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale

Faculty Scholarship

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Speech Engines, James Grimmelmann Jan 2014

Speech Engines, James Grimmelmann

Faculty Scholarship

Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.

A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …


Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks Jan 2014

Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale Jan 2014

The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale

Faculty Scholarship

Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees, reliable tenants, valuable customers—or deadbeats, shirkers, menaces, and “wastes of time.” Crucial opportunities are on the line, including the ability to obtain loans, work, housing, and insurance. Though automated scoring is pervasive and consequential, it is also opaque and lacking oversight. In one area where regulation does prevail—credit—the law focuses on credit history, not the derivation of scores from data.

Procedural regularity is essential for those stigmatized by “artificially intelligent” scoring systems. The American due process tradition should inform …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2013

From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract …


Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray Jan 2013

Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray

Faculty Scholarship

In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …


Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart Jan 2013

Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart

Faculty Scholarship

In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …


The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann Jan 2012

The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann

Faculty Scholarship

This essay is a response to Derek Bambauer's article Orwell's Armchair, which proposes "[a] statute enabling censorship of Internet materia." Bambauer's theory is process-oriented: it focuses on the institutions that engage in censorship and the procedures that they follow. Accordingly, the essay examines his arguments through the lens of the canonical Legal Process text: Hart and Sacks' The Legal Process. A series of notes and queries inquire whether his proposed statute would limit censorship, regularize it, or legitimate it.


Sealand, Havenco, And The Rule Of Law, James Grimmelmann Jan 2012

Sealand, Havenco, And The Rule Of Law, James Grimmelmann

Faculty Scholarship

In 2000, a group of American entrepreneurs moved to a former World War II anti-aircraft platform in the North Sea, seven miles off the British coast, and launched HavenCo, one of the strangest start-ups in Internet history. A former pirate radio broadcaster, Roy Bates, had occupied the platform in the 1960s, moved his family aboard, and declared it to be the sovereign Principality of Sealand. HavenCo's founders were opposed to governmental censorship and control of the Internet; by putting computer servers on Sealand, they planned to create a "data haven" for unpopular speech, safely beyond the reach of any other …


Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale

Faculty Scholarship

A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.

While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton Jan 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill Beaners, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based …


Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale Jan 2011

Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale

Faculty Scholarship

When American lawyers talk about "essential facilities," they are usually referring to antitrust doctrine that has required certain platforms to provide access on fair and nondiscriminatory terms to all comers. Some have recently characterized Google as an essential facility. Antitrust law may shape the search engine industry in positive ways. However, scholars and activists must move beyond the crabbed vocabulary of competition policy to develop a richer normative critique of search engine dominance.

In this chapter, I sketch a new concept of "essential cultural and political facility," which can help policymakers recognize and address situations where a bottleneck has become …


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron Jan 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Faculty Scholarship

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.

In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …


What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2010

What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Jan 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …