Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (6)
- Google (4)
- Information privacy (3)
- Internet (3)
- Social media (3)
-
- Consumer privacy (2)
- Cyberspace (2)
- Cyberspace law (2)
- Data mining (2)
- First Amendment (2)
- Fusion centers (2)
- Government (2)
- Invasion of privacy (2)
- Search engine (2)
- Agreements (1)
- American Law Institute (1)
- Antitrust (1)
- Artificial intelligence (1)
- Big Data (1)
- BitTorrent (1)
- Blocking (1)
- Censorship (1)
- Civil liberties (1)
- Civil rights (1)
- Clickstream data (1)
- Code is law (1)
- Comcast (1)
- Common carrier (1)
- Communication (1)
- Constitutional law (1)
- Publication Year
Articles 1 - 30 of 51
Full-Text Articles in Law
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Homeland Security Publications
No abstract provided.
What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius
What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Sexual Privacy, Danielle Keats Citron
Sexual Privacy, Danielle Keats Citron
Faculty Scholarship
Those who wish to control and expose the identities of women and people from marginalized communities routinely do so by invading their privacy. People are secretly recorded in bedrooms and public bathrooms, and “up their skirts.” They are coerced into sharing nude photographs and filming sex acts under the threat of public disclosure of their nude images. People’s nude images are posted online without permission. Machine-learning technology is used to create digitally manipulated “deep fake” sex videos that swap people’s faces into pornography.
At the heart of these abuses is an invasion of sexual privacy—the behaviors and expectations that manage …
Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell
Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell
Faculty Scholarship
No abstract provided.
Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale
Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
The Automated Public Sphere, Frank A. Pasquale
The Automated Public Sphere, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank A. Pasquale
Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron
The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron
Faculty Scholarship
No abstract provided.
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Homeland Security Publications
No abstract provided.
Anarchy, Status Updates, And Utopia, James Grimmelmann
Anarchy, Status Updates, And Utopia, James Grimmelmann
Faculty Scholarship
Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; Paypal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.
Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power there is also social power. Whenever people come together …
The Virtues Of Moderation, James Grimmelmann
The Virtues Of Moderation, James Grimmelmann
Faculty Scholarship
TL;DR—On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.
The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town meetings …
Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale
Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale
Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale
Faculty Scholarship
Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.
Speech Engines, James Grimmelmann
Speech Engines, James Grimmelmann
Faculty Scholarship
Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.
A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …
Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks
Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks
Faculty Scholarship
Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.
The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale
The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale
Faculty Scholarship
Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees, reliable tenants, valuable customers—or deadbeats, shirkers, menaces, and “wastes of time.” Crucial opportunities are on the line, including the ability to obtain loans, work, housing, and insurance. Though automated scoring is pervasive and consequential, it is also opaque and lacking oversight. In one area where regulation does prevail—credit—the law focuses on credit history, not the derivation of scores from data.
Procedural regularity is essential for those stigmatized by “artificially intelligent” scoring systems. The American due process tradition should inform …
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
Faculty Scholarship
This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …
From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds
From Lord Coke To Internet Privacy: The Past, Present, And Future Of Electronic Contracting, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
Contract law is applied countless times every day, in every manner of transaction large or small. Rarely are those transactions reflected in an agreement produced by a lawyer; quite the contrary, almost all contracts are concluded by persons with no legal training and often by persons who do not have a great deal of education. In recent years, moreover, technological advances have provided novel methods of creating contracts. Those facts present practitioners of contract law with an interesting conundrum: The law must be sensible and stable if parties are to have confidence in the security of their arrangements; but contract …
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Addressing The Harm Of Total Surveillance: A Reply To Professor Neil Richards, Danielle Keats Citron, David C. Gray
Faculty Scholarship
In his insightful article The Dangers of Surveillance, 126 HARV. L. REV. 1934 (2013), Neil Richards offers a framework for evaluating the implications of government surveillance programs that is centered on protecting "intellectual privacy." Although we share his interest in recognizing and protecting privacy as a condition of personal and intellectual development, we worry in this essay that, as an organizing principle for policy, "intellectual privacy" is too narrow and politically fraught. Drawing on other work, we therefore recommend that judges, legislators, and executives focus instead on limiting the potential of surveillance technologies to effect programs of broad and indiscriminate …
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Fighting Cybercrime After United States V. Jones, David C. Gray, Danielle Keats Citron, Liz Clark Rinehart
Faculty Scholarship
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus …
The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann
The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann
Faculty Scholarship
This essay is a response to Derek Bambauer's article Orwell's Armchair, which proposes "[a] statute enabling censorship of Internet materia." Bambauer's theory is process-oriented: it focuses on the institutions that engage in censorship and the procedures that they follow. Accordingly, the essay examines his arguments through the lens of the canonical Legal Process text: Hart and Sacks' The Legal Process. A series of notes and queries inquire whether his proposed statute would limit censorship, regularize it, or legitimate it.
Sealand, Havenco, And The Rule Of Law, James Grimmelmann
Sealand, Havenco, And The Rule Of Law, James Grimmelmann
Faculty Scholarship
In 2000, a group of American entrepreneurs moved to a former World War II anti-aircraft platform in the North Sea, seven miles off the British coast, and launched HavenCo, one of the strangest start-ups in Internet history. A former pirate radio broadcaster, Roy Bates, had occupied the platform in the 1960s, moved his family aboard, and declared it to be the sovereign Principality of Sealand. HavenCo's founders were opposed to governmental censorship and control of the Internet; by putting computer servers on Sealand, they planned to create a "data haven" for unpopular speech, safely beyond the reach of any other …
Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale
Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale
Faculty Scholarship
A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.
While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …
Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton
Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle Keats Citron, Helen L. Norton
Faculty Scholarship
No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group Kill a Jew Day, for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like How to Kill Beaners, Execute the Gays, and Murder Muslim Scum. The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.
Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based …
Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale
Dominant Search Engines: An Essential Cultural & Political Facility, Frank Pasquale
Faculty Scholarship
When American lawyers talk about "essential facilities," they are usually referring to antitrust doctrine that has required certain platforms to provide access on fair and nondiscriminatory terms to all comers. Some have recently characterized Google as an essential facility. Antitrust law may shape the search engine industry in positive ways. However, scholars and activists must move beyond the crabbed vocabulary of competition policy to develop a richer normative critique of search engine dominance.
In this chapter, I sketch a new concept of "essential cultural and political facility," which can help policymakers recognize and address situations where a bottleneck has become …
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Faculty Scholarship
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.
In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …
What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds
What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …