Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 36

Full-Text Articles in Law

Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr. Oct 2015

One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.

All Faculty Scholarship

The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.

Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan Oct 2014

Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan

All Faculty Scholarship

The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Access To Justice And Technology Clinics: A 4% Solution (With Andrew P. Medeiros) (Symposium), Ronald W. Staudt Jul 2013

Access To Justice And Technology Clinics: A 4% Solution (With Andrew P. Medeiros) (Symposium), Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


Introduction, Justice, Lawyering And Legal Education In The Digital Age (Symposium Editor With M. Lauritsen), Ronald W. Staudt Jul 2013

Introduction, Justice, Lawyering And Legal Education In The Digital Age (Symposium Editor With M. Lauritsen), Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


The Normativity Of Copying In Copyright Law, Shyamkrishna Balganesh Nov 2012

The Normativity Of Copying In Copyright Law, Shyamkrishna Balganesh

All Faculty Scholarship

Not all copying constitutes copyright infringement. Quite independent of fair use, copyright law requires that an act of copying be qualitatively and quantitatively significant enough or “substantially similar” for it to be actionable. Originating in the nineteenth century, and entirely the creation of courts, copyright’s requirement of “substantial similarity” has thus far received little attention as an independently meaningful normative dimension of the copyright entitlement. This Article offers a novel theory for copyright’s substantial-similarity requirement by placing it firmly at the center of the institution and its various goals and purposes. As a common-law-style device that mirrors the functioning of …


Enhancing Public Access To Online Rulemaking Information, Cary Coglianese Oct 2012

Enhancing Public Access To Online Rulemaking Information, Cary Coglianese

All Faculty Scholarship

One of the most significant powers exercised by federal agencies is their power to make rules. Given the importance of agency rulemaking, the process by which agencies develop rules has long been subject to procedural requirements aiming to advance democratic values of openness and public participation. With the advent of the digital age, government agencies have engaged in increasing efforts to make rulemaking information available online as well as to elicit public participation via electronic means of communication. How successful are these efforts? How might they be improved? In this article, I investigate agencies’ efforts to make rulemaking information available …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan Jan 2012

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan

All Faculty Scholarship

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …


The Obligatory Structure Of Copyright Law: Unbundling The Wrong Of Copying, Shyamkrishna Balganesh Jan 2012

The Obligatory Structure Of Copyright Law: Unbundling The Wrong Of Copying, Shyamkrishna Balganesh

All Faculty Scholarship

No abstract provided.


Cyberclinics: Law Schools, Technology And Justice, Ronald W. Staudt Jan 2011

Cyberclinics: Law Schools, Technology And Justice, Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


"Hot News": The Enduring Myth Of Property In News, Shyamkrishna Balganesh Jan 2011

"Hot News": The Enduring Myth Of Property In News, Shyamkrishna Balganesh

All Faculty Scholarship

No abstract provided.


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo Jan 2011

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

All Faculty Scholarship

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …


Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner Mar 2010

Undermined Norms: The Corrosive Effect Of Information Processing Technology On Informational Privacy, Richard Warner

All Faculty Scholarship

Informational privacy is a matter of control; it consists in the ability to control when one’s personal information is collected, how it is used, and to whom it is distributed. The degree of control we once enjoyed has vanished. Advances in information processing technology now give others considerable power to determine when personal information is collected, how it is used, and to it is whom distributed. Privacy advocates sound the alarm in regard to both the governmental and private sectors. I focus exclusively on the later. Relying on the extensive privacy advocate literature, I assume we should try to regain …


Transforming Legal Aid, Ronald W. Staudt Apr 2009

Transforming Legal Aid, Ronald W. Staudt

All Faculty Scholarship

No abstract provided.


Foreseeability And Copyright Incentives, Shyamkrishna Balganesh Apr 2009

Foreseeability And Copyright Incentives, Shyamkrishna Balganesh

All Faculty Scholarship

Copyright law’s principal justification today is the economic theory of creator incentives. Central to this theory is the recognition that while copyright’s exclusive rights framework provides creators with an economic incentive to create, it also entails large social costs, and that creators therefore need to be given just enough incentive to create in order to balance the system’s benefits against its costs. Yet, none of copyright’s current doctrines enable courts to circumscribe a creator’s entitlement by reference to limitations inherent in the very idea of incentives. While the common law too relies on providing actors with incentives to behave in …


Reasonable Emissions Of Greenhouse Gases: Efficient Abatement For A Stock Pollutant, Howard F. Chang Jan 2007

Reasonable Emissions Of Greenhouse Gases: Efficient Abatement For A Stock Pollutant, Howard F. Chang

All Faculty Scholarship

No abstract provided.


Citizen Participation In Rulemaking: Past, Present, And Future, Cary Coglianese Jan 2006

Citizen Participation In Rulemaking: Past, Present, And Future, Cary Coglianese

All Faculty Scholarship

Administrative law scholars and governmental reformers argue that advances in information technology will greatly expand public participation in regulatory policy making. They claim that e-rulemaking, or the application of new technology to administrative rulemaking, promises to transform a previously insulated process into one in which ordinary citizens regularly provide input. With the federal government having implemented several e-rulemaking initiatives in recent years, we can now begin to assess whether such a transformation is in the works—or even on the horizon. This paper compares empirical observations on citizen participation in the past, before e-rulemaking, with more recent data on citizen participation …


Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner Mar 2005

Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner

All Faculty Scholarship

No abstract provided.


Shifting Sands: The Limits Of Science In Setting Risk Standards, Cary Coglianese, Gary E. Marchant Apr 2004

Shifting Sands: The Limits Of Science In Setting Risk Standards, Cary Coglianese, Gary E. Marchant

All Faculty Scholarship

Regulators need to rely on science to understand problems and predict the consequences of regulatory actions, but over reliance on science can actually contribute to, or at least deflect attention from, incoherent policymaking. In this article, we explore the problems with using science to justify policy decisions by analyzing the Environmental Protection Agency's recently revised air quality standards for ground-level ozone and particulate matter, some of the most significant regulations ever issued. In revising these standards, EPA mistakenly invoked science as the exclusive basis for its decisions and deflected attention from a remarkable series of inconsistencies. For example, even though …


Border Disputes: Trespass To Chattels On The Internet, Richard Warner Mar 2002

Border Disputes: Trespass To Chattels On The Internet, Richard Warner

All Faculty Scholarship

No abstract provided.


Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen Jan 2001

Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen Jan 2000

Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Coercing Privacy, Anita L. Allen Mar 1999

Coercing Privacy, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Is The Environmental Movement A Critical Internet Technology?, Henry H. Perritt Jr. Mar 1997

Is The Environmental Movement A Critical Internet Technology?, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Global Technological Integration, Intellectual Property Rights, And Competition Law: Some Introductory Comments, David J. Gerber Jan 1996

Global Technological Integration, Intellectual Property Rights, And Competition Law: Some Introductory Comments, David J. Gerber

All Faculty Scholarship

No abstract provided.


Video Depositions, Transcripts And Trials, Henry H. Perritt Jr. Mar 1994

Video Depositions, Transcripts And Trials, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.