Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 32

Full-Text Articles in Law

Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin Jan 2022

Requiring What’S Not Required: Circuit Courts Are Disregarding Supreme Court Precedent And Revisiting Officer Inadvertence In Cyberlaw Cases, Michelle Zakarin

Scholarly Works

As the age of technology has taken this country by surprise and left us with an inability to formally prepare our legal system to incorporate these advances, many courts are forced to adapt by applying pre-technology rules to new technological scenarios. One illustration is the plain view exception to the Fourth Amendment. Recently, the issue of officer inadvertence at the time of the search, a rule that the United States Supreme Court has specifically stated is not required in plain view inquiries, has been revisited in cyber law cases. It could be said that the courts interested in the existence …


Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg Jan 2021

Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg

Faculty Scholarship

This essay explores one of the most important, but occasionally intractable, issues under the Berne Convention, the concept of Country of Origin. Article 5(4) of that treaty defines a work’s country of origin, but leaves out several situations, leaving those who interpret and apply the treaty without guidance in ascertaining the country of origin. I will call those situations the “Conundra of the country of origin,” and will explore two of them here. First, what is the country of origin of an unpublished work whose authors are nationals of different countries? Second, what is the country of origin of a …


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


A Third-Party Doctrine For Digital Metadata, H. Brian Holland Apr 2020

A Third-Party Doctrine For Digital Metadata, H. Brian Holland

Faculty Scholarship

For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …


Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman Feb 2020

Crash Goes Icann's Multistakeholder Model, Kathryn Kleiman

Articles in Law Reviews & Other Academic Journals

In 1995, the Internet was becoming a global phenomenon and users needed "domain names"--the street signs of Internet addresses--for an array of commercial and noncommercial speech. A small community of "multistakeholders"--business, civil society, governments, technologists, intellectual property and non-government organization representations--began to write rules for Internet addresses largely on behalf of a global population that had yet to be connected to the Internet. I had the privilege of being part of that group. Since then, Internet use has skyrocketed from 70 million users (1.7% of the world population) in 1995 to over 4.5 billion users (58.8% of the world population) …


Lessons From Literal Crashes For Code, Margot Kaminski Jan 2019

Lessons From Literal Crashes For Code, Margot Kaminski

Publications

No abstract provided.


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Liability For Providing Hyperlinks To Copyright-Infringing Content: International And Comparative Law Perspectives, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2018

Liability For Providing Hyperlinks To Copyright-Infringing Content: International And Comparative Law Perspectives, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

Hyperlinking, at once an essential means of navigating the Internet, but also a frequent means to enable infringement of copyright, challenges courts to articulate the legal norms that underpin domestic and international copyright law, in order to ensure effective enforcement of exclusive rights on the one hand, while preserving open communication on the Internet on the other. Several recent cases, primarily in the European Union, demonstrate the difficulties of enforcing the right of communication to the public (or, in U.S. copyright parlance, the right of public performance by transmission) against those who provide hyperlinks that effectively deliver infringing content to …


Conceptualizing Cryptolaw, Carla L. Reyes Jan 2017

Conceptualizing Cryptolaw, Carla L. Reyes

Faculty Journal Articles and Book Chapters

Sweden transfers its real property recording system to the blockchain, a software protocol that enables public, cryptographically secure transaction verification without reliance upon a trusted third party. Dubai plans to issue blockchain-based government documents. The United States Department of Health and Human Services investigates blockchain-based systems for managing health data. Illinois explores blockchain-based applications for use in the Illinois government. News of governments and public-private partnerships developing blockchain-based legal applications increasingly splash across the headlines; however the law-makers using blockchain and other Distributed Ledger Technology (DLT) systems to implement legal processes do not systematically consider the broader implications of their …


Whither (Not Wither) Copyleft, Eben Moglen Jan 2017

Whither (Not Wither) Copyleft, Eben Moglen

Faculty Scholarship

This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Intellectual Property In News? Why Not?, Sam Ricketson, Jane C. Ginsburg Jan 2016

Intellectual Property In News? Why Not?, Sam Ricketson, Jane C. Ginsburg

Faculty Scholarship

This Chapter addresses arguments for and against property rights in news, from the outset of national law efforts to safeguard the efforts of newsgathers, through the various unsuccessful attempts during the early part of the last century to fashion some form of international protection within the Berne Convention on literary and artistic works and the Paris Convention on industrial property. The Chapter next turns to contemporary endeavors to protect newsgatherers against “news aggregation” by online platforms. It considers the extent to which the aggregated content might be copyrightable, and whether, even if the content is protected, various exceptions set out …


Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale Dec 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


Proposal For An International Convention On Online Gambling, Marketa Trimble Jun 2012

Proposal For An International Convention On Online Gambling, Marketa Trimble

Scholarly Works

The proposal, which will be published as a chapter in a volume from the Internet Gaming Regulation Symposium co-organized by the William S. Boyd School of Law of the University of Nevada, Las Vegas, in May 2012, presents the outline of an international convention ('Convention') that will facilitate cooperation among countries in enforcement of their online gambling regulations while allowing the countries to maintain their individual legal approaches to online gambling. Countries continue to vary in their approaches - some permit and regulate, and others prohibit online gambling, and even countries that permit and regulate online gambling approach the issue …


Hostile Educational Environments, Ari Ezra Waldman Jan 2012

Hostile Educational Environments, Ari Ezra Waldman

Articles & Chapters

This Article is one in a series about bullying and cyberbullying in schools. I argue that the proper analysis for a First Amendment challenge to school discipline for off-campus misuse of the Internet to harm or harass a member of the school community based on the victim’s identity depends on the nature of the offending behavior. For students who are punished for a single incident – what I will call cyberattacking – a Tinker analysis makes sense. But, given that Tinker’s “substantial disruption” standard originated in the context of student protests and that targeted identity-based harassment can create substantial disruptions …


Tormented: Antigay Bullying In Schools, Ari Ezra Waldman Jan 2012

Tormented: Antigay Bullying In Schools, Ari Ezra Waldman

Articles & Chapters

This Article begins a theoretical and empirical discussion on bullying and cyberharassment of all students, but particularly gay and lesbian youth. Despite the recent spate of bullying-related suicides, I argue that antibullying proposals that include harsh criminal punishments for egregious cases of bullying and cyberbullying in schools lack validity as a matter of legal theory and practice. In fact, it is what makes criminalization so initially attractive — that is, the public’s emotional and retributive need for punishments equal to bullying tragedies — that ultimately leaves the proposal devoid of reason. Criminalization proposals only satisfy retributive aims and are unlikely …


Public Forum 2.0, Lyrissa Barnett Lidsky Jan 2011

Public Forum 2.0, Lyrissa Barnett Lidsky

UF Law Faculty Publications

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Government Speech 2.0, Helen Norton, Danielle Keats Citron Jan 2010

Government Speech 2.0, Helen Norton, Danielle Keats Citron

Publications

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine--which recognizes "government speech" as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint--only in the context of disputes involving fairly traditional forms of expression. In none of these decisions, moreover, has the …


Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman Jan 2010

Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman

Faculty Publications

This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …


Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton Jan 2010

Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton

Publications

No abstract provided.


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Code, Crash, And Open Source: The Outsourcing Of Financial Regulation To Risk Models And The Global Financial Crisis, Erik F. Gerding Jan 2009

Code, Crash, And Open Source: The Outsourcing Of Financial Regulation To Risk Models And The Global Financial Crisis, Erik F. Gerding

Publications

The widespread use of computer-based risk models in the financial industry during the last two decades enabled the marketing of more complex financial products to consumers, the growth of securitization and derivatives, and the development of sophisticated risk-management strategies by financial institutions. Over this same period, regulators increasingly delegated or outsourced vast responsibility for regulating risk in both consumer finance and financial markets to these privately owned industry models. Proprietary risk models of financial institutions thus came to serve as a "new financial code" that regulated transfers of risk among consumers, financial institutions, and investors.

The spectacular failure of financial-industry …


To (C) Or Not To (C)? Copyright And Innovation In The Digital Typeface Industry, Jacqueline D. Lipton Jan 2009

To (C) Or Not To (C)? Copyright And Innovation In The Digital Typeface Industry, Jacqueline D. Lipton

Articles

Intellectual property rights are often justified by utilitarian theory. However, recent scholarship suggests that creativity thrives in some industries in the absence of intellectual property protection. These industries might be called IP's negative spaces. One such industry that has received little scholarly attention is the typeface industry. This industry has recently digitized. Its adoption of digital processes has altered its market structure in ways that necessitate reconsideration of its IP negative status, with particular emphasis on copyright. This article considers the historical denial of copyright protection for typefaces in the United States, and examines arguments both for and against extending …


The Memory Gap In Surveillance Law, Patricia L. Bellia Jan 2008

The Memory Gap In Surveillance Law, Patricia L. Bellia

Journal Articles

U.S. information privacy laws contain a memory gap: they regulate the collection and disclosure of certain kinds of information, but they say little about its retention. This memory gap has ever-increasing significance for the structure of government surveillance law. Under current doctrine, the Fourth Amendment generally requires government agents to meet high standards before directly and prospectively gathering a target's communications. The law takes a dramatically different approach to indirect, surveillance-like activities, such as the compelled production of communications from a third party, even when those activities yield the same information as, or more information than, direct surveillance activities. Because …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Jan 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Articles

When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald Jan 2008

Fourth Amendment Protection For Stored E-Mail, Patricia L. Bellia, Susan Freiwald

Journal Articles

The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …


Should Property Or Liability Rules Govern Information?, Mark A. Lemley, Philip J. Weiser Jan 2007

Should Property Or Liability Rules Govern Information?, Mark A. Lemley, Philip J. Weiser

Publications

This Article focuses on an unappreciated and significant aspect of the debate over property rules in the technology law context. In particular, it argues that the classic justification for legal entitlements protected by a property rule - i.e., a right to injunctive relief - depends on the ability to define and enforce property rights effectively. In the case of many technology markets, the inability to tailor injunctive relief so that it protects only the underlying right rather than also enjoining noninfringing conduct provides a powerful basis for using a liability rule (i.e., awarding the relevant damages to the plaintiff) instead …


Safe From Sex Offenders? Legislating Internet Publication Of Sex Offender Registries, Bill F. Chamberlin, Christina Locke Jan 2007

Safe From Sex Offenders? Legislating Internet Publication Of Sex Offender Registries, Bill F. Chamberlin, Christina Locke

UF Law Faculty Publications

In July 2005, the U.S. Department of Justice implemented the National Sex Offender Public Registry, which links the registries of individual states. A year later, the Adam Walsh Bill created the Dru Sjodin National Sex Offender Public Website, which required the Department of Justice to maintain a comprehensive national sex offender registry.

The purpose of this article is to examine the statutory provisions of every state and the District of Columbia regarding the use of the Internet as a tool in administering Megan's Law. The analysis begins by examining sex offender registration and notification laws at the federal level and …


The Ghost Of Telecommunications Past, Philip J. Weiser Jan 2005

The Ghost Of Telecommunications Past, Philip J. Weiser

Publications

Paul Starr's The Creation of the Media presents modern policymakers with an important opportunity to consider the historical lessons of the telecommunications industry. This Book Review underscores how Starr's book richly explains some key components of U.S. information policy - such as relying on an integrated strategy of intellectual property, antitrust law, and telecommunications policy - and that some historical lessons are misplaced as to today's environment - such as a categorical skepticism of vertical integration. Moreover, Starr's account of telecommunications history explains that the U.S.'s success in promoting innovation in the information industries reflects our reluctance to manage key …


Policing The Spectrum Commons, Philip J. Weiser, Dale N. Hatfield Jan 2005

Policing The Spectrum Commons, Philip J. Weiser, Dale N. Hatfield

Publications

One of the most contested questions in spectrum policy is whether bands of spectrum left as unlicensed will fall victim to the tragedy of the commons. Advocates of increased unlicensed spectrum often downplay what enforcement measures are necessary to minimize interference and to prevent the tragedy of the commons problem. Even imposing spectrum etiquette requirements in addition to the FCC's equipment certification program will fail to address this concern effectively, as the development of such measures - e.g., the requirement that devices listen before they talk - does not ensure that they will be followed. Indeed, if there are incentives …