Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

The Automated Fourth Amendment, Maneka Sinha Jan 2024

The Automated Fourth Amendment, Maneka Sinha

Faculty Scholarship

Courts routinely defer to police officer judgments in reasonable suspicion and probable cause determinations. Increasingly, though, police officers outsource these threshold judgments to new forms of technology that purport to predict and detect crime and identify those responsible. These policing technologies automate core police determinations about whether crime is occurring and who is responsible. Criminal procedure doctrine has failed to insist on some level of scrutiny of—or skepticism about—the reliability of this technology. Through an original study analyzing numerous state and federal court opinions, this Article exposes the implications of law enforcement’s reliance on these practices given the weighty interests …


Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell Jan 2018

Prediction, Persuasion, And The Jurisprudence Of Behaviorism, Frank A. Pasquale, Glyn Cashwell

Faculty Scholarship

No abstract provided.


A Rule Of Persons, Not Machines: The Limits Of Legal Automation, Frank A. Pasquale Jan 2018

A Rule Of Persons, Not Machines: The Limits Of Legal Automation, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Technological Triggers To Tort Revolutions: Steam Locomotives, Autonomous Vehicles, And Accident Compensation, Donald G. Gifford Jan 2017

Technological Triggers To Tort Revolutions: Steam Locomotives, Autonomous Vehicles, And Accident Compensation, Donald G. Gifford

Faculty Scholarship

No abstract provided.


The Spectrum Of Control: A Social Theory Of The Smart City, Jathan Sadowski, Frank A. Pasquale Jul 2015

The Spectrum Of Control: A Social Theory Of The Smart City, Jathan Sadowski, Frank A. Pasquale

Faculty Scholarship

There is a certain allure to the idea that cities allow a person to both feel at home and like a stranger in the same place. That one can know the streets and shops, avenues and alleys, while also going days without being recognized. But as elites fill cities with “smart” technologies—turning them into platforms for the “Internet of Things” (IoT): sensors and computation embedded within physical objects that then connect, communicate, and/or transmit information with or between each other through the Internet—there is little escape from a seamless web of surveillance and power. This paper will outline a social …


Four Futures Of Legal Automation, Frank A. Pasquale, Glyn Cashwell Jan 2015

Four Futures Of Legal Automation, Frank A. Pasquale, Glyn Cashwell

Faculty Scholarship

Simple legal jobs (such as document coding) are prime candidates for legal automation. More complex tasks cannot be routinized. So far, the debate on the likely scope and intensity of legal automation has focused on the degree to which legal tasks are simple or complex. Just as important to the legal profession, however, is the degree of regulation or deregulation likely in the future.

Situations involving conflicting rights, unique fact patterns, and open-ended laws will remain excessively difficult to automate for an extended period of time. Deregulation, however, may effectively strip many persons of their rights, rendering once-hard cases simple. …


When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck Jan 2014

When Enough Is Enough: Location Tracking, Mosaic Theory, And Machine Learning, Steven M. Bellovin, Renée M. Hutchins, Tony Jebara, Sebastian Zimmeck

Faculty Scholarship

Since 1967, when it decided Katz v. United States, the Supreme Court has tied the right to be free of unwanted government scrutiny to the concept of reasonable xpectations of privacy.[1] An evaluation of reasonable expectations depends, among other factors, upon an assessment of the intrusiveness of government action. When making such assessment historically the Court has considered police conduct with clear temporal, geographic, or substantive limits. However, in an era where new technologies permit the storage and compilation of vast amounts of personal data, things are becoming more complicated. A school of thought known as “mosaic theory” …


Christopher V. Smithkline Beecham Corporation: An Unsurprising Loss For Pharmaceutical Sales Representatives And An Erosion Of Power For Administrative Agencies, Anna Johnston Jan 2013

Christopher V. Smithkline Beecham Corporation: An Unsurprising Loss For Pharmaceutical Sales Representatives And An Erosion Of Power For Administrative Agencies, Anna Johnston

Proxy

No abstract provided.


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


How To Fix The Google Book Search Settlement, James Grimmelmann Apr 2009

How To Fix The Google Book Search Settlement, James Grimmelmann

Faculty Scholarship

The proposed settlement in the Google Book Search case should be approved with strings attached. The project will be immensely good for society, and the proposed deal is a fair one for Google, for authors, and for publishers. The public interest demands, however, that the settlement be modified first. It creates two new entities—the Books Rights Registry Leviathan and the Google Book Search Behemoth—with dangerously concentrated power over the publishing industry. Left unchecked, they could trample on consumers in any number of ways. We the public have a right to demand that those entities be subject to healthy, pro-competitive oversight, …


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Jan 2009

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …


Cyber Civil Rights, Danielle Keats Citron Dec 2008

Cyber Civil Rights, Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Technological Due Process, Danielle Keats Citron May 2008

Technological Due Process, Danielle Keats Citron

Faculty Scholarship

Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason.

The dichotomy between these procedural regimes has become outmoded. This century’s automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …


Open Code Governance, Danielle Keats Citron Jan 2008

Open Code Governance, Danielle Keats Citron

Faculty Scholarship

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds Jan 2008

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this survey, we discuss electronic contracting cases decided between July 1, 2007 and June 30, 2008. In addition to cases adding to the literature on the enforceability of online contracts, this survey includes cases discussing modification of online contracts, incorporation by reference, and unconscionability. We conclude that our common law is developing nicely to address the issues presented by internet contracting.


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds Jan 2007

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Technology, Competition, And Values, Frank Pasquale Jan 2007

Technology, Competition, And Values, Frank Pasquale

Faculty Scholarship

Law can advance or retard the distributive effects of innovation and its diffusion in many ways. Certain technologies merit special monitoring because they promote the leveraging of economic advantage into social or cultural advantage without substantially increasing overall social welfare. Others threaten to undermine collective values and perceptions commonly used to evaluate technology. A final category threatens to do both, creating unfair or wasteful competition while blunting our capacity to recognize its morally dubious character.

As new sectors of life become more game-like and competitive, methods of leveling the playing field developed in sports and college admissions might become more …


Minimum Contacts In A Borderless World: Voice Over Internet Protocol And The Coming Implosion Of Personal Jurisdiction Theory, Danielle Keats Citron Jan 2006

Minimum Contacts In A Borderless World: Voice Over Internet Protocol And The Coming Implosion Of Personal Jurisdiction Theory, Danielle Keats Citron

Faculty Scholarship

Modern personal jurisdiction theory rests on the twin pillars of state sovereignty and due process. A nonresident’s “minimum contacts” with a forum state are treated as the equivalent of her territorial presence in the state and hence justify a state’s exercise of sovereignty over her. At the same time, the nonresident’s “purposeful availment” of opportunities within the state is seen as implying her agreement to that state’s jurisdiction in exchange for the protection of its laws. This theory presumes that a nonresident directs voice communications to known places by dialing a telephone number’s area code. Voice over Internet Protocol (“VoIP”) …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Jan 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


Future Public Policy And Ethical Issues Facing The Agricultural And Microbial Genomics Sectors Of The Biotechnology Industry, Diane E. Hoffmann, Lawrence M. Sung Feb 2005

Future Public Policy And Ethical Issues Facing The Agricultural And Microbial Genomics Sectors Of The Biotechnology Industry, Diane E. Hoffmann, Lawrence M. Sung

Faculty Scholarship

No abstract provided.


Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello Jan 2005

Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This article reviews recent developments in the United States and the European Union involving Internet transactions. It describes those developments and analyzes both from a normative and practical perspective.


Before It's Too Late- Addressing Fear Of Genetic Information, Karen H. Rothenberg, Sharon F. Terry Jan 2002

Before It's Too Late- Addressing Fear Of Genetic Information, Karen H. Rothenberg, Sharon F. Terry

Faculty Scholarship

No abstract provided.


Fulfilling Technology's Promise: Enforcing The Rights Of Women Caught In The Global High-Tech Underclass, Shruti Rana Jan 2000

Fulfilling Technology's Promise: Enforcing The Rights Of Women Caught In The Global High-Tech Underclass, Shruti Rana

Faculty Scholarship

In the early 1980s, Malaysian women working in electronics factories began to experience hallucinations and seizures. Factory bosses manipulated their employees' religious and cultural beliefs, convincing the women that their bodies were inhabited by demons. In this manner, they avoided confronting the more likely causes: the rigid, paternalistic work environment, the intense production pressures placed on the women, and the lengthy shifts and potentially hazardous conditions that the women were forced to endure. This example illustrates the use of gender, religion, and to control and exploit women's labor in the high-tech industry. Unfortunately, this is not an isolated situation.

This …


The Biotechnology Revolution And Its Regulatory Evolution, Diane E. Hoffmann Apr 1989

The Biotechnology Revolution And Its Regulatory Evolution, Diane E. Hoffmann

Faculty Scholarship

No abstract provided.