Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (10)
- University of Colorado Law School (6)
- American University Washington College of Law (5)
- Boston University School of Law (5)
- University of Pittsburgh School of Law (5)
-
- Southern Methodist University (4)
- University of Michigan Law School (4)
- Pace University (3)
- Florida International University College of Law (2)
- Schulich School of Law, Dalhousie University (2)
- California Western School of Law (1)
- Case Western Reserve University School of Law (1)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Columbia Law School (1)
- Fordham Law School (1)
- University of Baltimore Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Missouri-Kansas City School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Washington and Lee University School of Law (1)
- William & Mary Law School (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (12)
- Articles (10)
- Faculty Scholarship (9)
- Faculty Publications (5)
- Articles in Law Reviews & Other Academic Journals (4)
-
- Faculty Journal Articles and Book Chapters (4)
- Publications (4)
- Elisabeth Haub School of Law Faculty Publications (3)
- Articles, Book Chapters, & Popular Press (2)
- 2012 Energy Justice Conference and Technology Exposition (September 17-18) (1)
- Boyd Briefs / Road Scholars (1)
- Faculty Works (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Law Librarian Scholarship (1)
- Publications and Research (1)
- Scholarly Articles (1)
- The Future of Natural Resources Law and Policy (Summer Conference, June 6-8) (1)
Articles 1 - 30 of 61
Full-Text Articles in Law
Toward Stronger Data Protection Laws, Margot E. Kaminski
Toward Stronger Data Protection Laws, Margot E. Kaminski
Publications
No abstract provided.
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Faculty Scholarship
Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.
In this short Essay, we propose a model for legislating data loyalty. Our …
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Problems With Decision-Making, Joanna K. Sax
The Problems With Decision-Making, Joanna K. Sax
Faculty Scholarship
Our society faces major challenges in numerous areas, including climate change and healthcare. Addressing these problems with technological advances are of great importance. Increasingly, however, consumers are resisting or rejecting such technological interventions based on inappropriate assignment of risk. In other words, the consumer assessment of risk is not in line with evidence-based assessment of risk. This article focuses on two controversial areas, vaccines and genetically engineered food, as examples in which consumers assign a high risk despite an evidence-based assessment of low risk. This article describes how empirically tested decision-making theories explain why consumers inappropriately assign risk. While these …
The Internet Adopts Two-Way Radio, Henry Perritt
The Internet Adopts Two-Way Radio, Henry Perritt
All Faculty Scholarship
The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …
Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright
Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright
Articles
Best known for their role in the creation of cryptocurrencies like bitcoin, blockchains are revolutionizing the way technology entrepreneurs finance their business enterprises. In 2017 alone, tech entrepreneurs raised over $6 billion through the sale of blockchain-based digital tokens, with some sales lasting mere seconds before selling out. In a token sale, also referred to as an “initial coin offering” or “ICO,” organizers of a project sell digital tokens to members of the public to finance the development of new technological platforms and services. After the initial sale, cryptocurrency exchanges scattered across the globe list tokens for trading and facilitate …
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Articles in Law Reviews & Other Academic Journals
You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.
Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Articles
In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …
Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo
Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo
Faculty Scholarship
The “server rule” holds that online displays or performances of copyrighted content accomplished through “in-line” or “framing” hyperlinks do not trigger the exclusive rights of public display or performance unless the linker also possesses a copy of the underlying work. As a result, the rule shields a vast array of online activities from claims of direct copyright infringement, effectively exempting those activities from the reach of the Copyright Act. While the server rule has enjoyed relatively consistent adherence since its adoption in 2007, some courts have recently suggested a departure from that precedent, noting the doctrinal and statutory inconsistencies underlying …
The Future Of Law And Mobility, Daniel A. Crane
The Future Of Law And Mobility, Daniel A. Crane
Articles
With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.
A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys
A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys
Faculty Publications
No abstract provided.
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
When Whispers Enter The Cloud, Heidi H. Liu
When Whispers Enter The Cloud, Heidi H. Liu
All Faculty Scholarship
With increased awareness of workplace harassment in recent years, the idea of enhanced reporting around sexual misconduct has gained traction. As a result, several technologies – from smartphone apps to well-publicized services – have been introduced with the goals of preventing, enabling reports of, and even predicting sexual misconduct at work, school and in public. But to what extent are these technologies secure and accessible to survivors? This Note documents the existing resources and proposes a framework focusing on privacy and participation for evaluating these tools intended to benefit survivors.
Regulation By Database, Nathan Cortez
Regulation By Database, Nathan Cortez
Faculty Journal Articles and Book Chapters
The federal government currently publishes 195,245 searchable databases online, a number of which include information about private parties that is negative or unflattering in some way. Federal agencies increasingly publish adverse data not just to inform the public or promote transparency, but to pursue regulatory ends ⎯ to change the underlying behavior being reported. Such "regulation by database" has become a preferred method of regulation in recent years, despite scant attention from policymakers, courts, or scholars on its appropriate uses and safeguards.
This Article, then, evaluates the aspirations and burdens of regulation by database. Based on case studies of six …
Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott
Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott
Articles
Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …
Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble
Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.
A video of the session is available here. Additionally, Professor Trimble's presentation is available here.
Conceptualizing Cryptolaw, Carla L. Reyes
Conceptualizing Cryptolaw, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Sweden transfers its real property recording system to the blockchain, a software protocol that enables public, cryptographically secure transaction verification without reliance upon a trusted third party. Dubai plans to issue blockchain-based government documents. The United States Department of Health and Human Services investigates blockchain-based systems for managing health data. Illinois explores blockchain-based applications for use in the Illinois government. News of governments and public-private partnerships developing blockchain-based legal applications increasingly splash across the headlines; however the law-makers using blockchain and other Distributed Ledger Technology (DLT) systems to implement legal processes do not systematically consider the broader implications of their …
Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams
Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams
All Faculty Scholarship
In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …
Internet Freedom With Teeth, Charles Duan
Internet Freedom With Teeth, Charles Duan
Articles in Law Reviews & Other Academic Journals
"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."
So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
From Anonymity To Identification, A. Michael Froomkin
From Anonymity To Identification, A. Michael Froomkin
Articles
This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
All Faculty Scholarship
As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.
• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …
Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson
Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Faculty Scholarship
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
All Faculty Scholarship
Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
All Faculty Scholarship
People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …
Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky
Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky
2012 Energy Justice Conference and Technology Exposition (September 17-18)
Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado
25 slides
Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford
Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford
Faculty Publications
Technology has always been a motivating force of change in the law. The creation of new machines and development of novel methods of achieving goals force the law to adapt with new and responsive rules. This is particularly true whenever a new technology transforms society. Whether it is increasing industrialization or computerization, pre-existing legal concepts rarely survive the transition unaltered - new prescriptions are announced while old ones disappear.
Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh
Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh
Faculty Scholarship
Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …
New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie
New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie
Articles, Book Chapters, & Popular Press
The globalized and decentralized Internet has become the new locus for a wide range of human activity, including commerce, crime, communications and cultural production. Activities which were once at the core of domestic jurisdiction have moved onto the Internet, and in doing so, have presented numerous challenges to the ability of states to exercise jurisdiction. In writing about these challenges, some scholars have characterized the Internet as a separate “space” and many refer to state jurisdiction over Internet activities as “extraterritorial.” This article examines these challenges in the context of the overall international law of jurisdiction, rather than focusing on …