Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 112

Full-Text Articles in Law

Authority And Authors And Codes, Michael J. Madison Jan 2016

Authority And Authors And Codes, Michael J. Madison

Articles

Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …


At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld Mar 2015

At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld

Articles

On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …


Charitable Organization Oversight: Rules V. Standards, Philip Hackney Jan 2015

Charitable Organization Oversight: Rules V. Standards, Philip Hackney

Articles

Congress has traditionally utilized standards as a means of communicating charitable tax law in the Code. In the past fifteen years, however, Congress has increasingly turned to rules to stop fraud and abuse in the charitable sector. I review the rules versus standards debate to evaluate this trend. Are Congressional rules the best method for regulating the charitable sector? While the complex changing nature of charitable purpose would suggest standards are better, the inadequacy of IRS enforcement and the large number of unsophisticated charitable organizations both augur strongly in favor of rules. Congress, however, is not the ideal institution to …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi Jan 2014

Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi

Articles

No abstract provided.


Lost Classics Of Intellectual Property Law, Michael J. Madison Jan 2014

Lost Classics Of Intellectual Property Law, Michael J. Madison

Articles

Santayana wrote, “Those who cannot remember the past are condemned to repeat it.” American legal scholarship often suffers from a related sin of omission: failing to acknowledge its intellectual debts. This short piece attempts to cure one possible source of the problem, in one discipline: inadequate information about what’s worth reading among older writing. I list “lost classics” of American scholarship in intellectual property law. These are not truly “lost,” and what counts as “classic” is often in the eye of the beholder (or reader). But these works may usefully be found again, and intellectual property law scholarship would be …


The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane Jan 2014

After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane

Articles

The Federal Trade Commission's (“FTC” or “the commission”) January 3, 2013 decision to close its longstanding investigation of Google1 brings to a close a flurry of discussion over the possibility that Google could become subject to a “search neutrality” principle in the United States. Although the Commission found against Google on several grounds, it rejected petitions from Google's critics to create a search neutrality principle as a matter of antitrust law. This essay briefly analyzes what remains of U.S. antitrust scrutiny of Internet search bias after the Google settlement. In particular, it suggests that a sensible line can be drawn …


Book Review -- William Patry, How To Fix Copyright, Michael J. Madison Jan 2013

Book Review -- William Patry, How To Fix Copyright, Michael J. Madison

Articles

I review William Patry’s book How to Fix Copyright. The book is noteworthy for its ambitious yet measured effort to diagnose where copyright law has gone astray in recent years. It is less successful with respect to proposing possible changes to the law. Most interesting are parallels between How to Fix Copyright and an earlier comprehensive look at copyright law in the digital era: Paul Goldstein’s Copyright’s Highway: From Gutenberg to the Celestial Jukebox. William Patry and Paul Goldstein each have a lot of faith in the power of consumer choice in the cultural marketplace. That faith leads …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


Antibiotic Resistance, Jessica D. Litman Jan 2012

Antibiotic Resistance, Jessica D. Litman

Articles

Ten years ago, when I wrote War Stories,' copyright lawyers were fighting over the question whether unlicensed personal, noncommercial copying, performance or display would be deemed copyright infringement. I described three strategies that lawyers for book publishers, record labels, and movie studios had deployed to try to assure that the question was answered the way they wanted it to be. First, copyright owners were labeling all unlicensed uses as "piracy" on the ground that any unlicensed use might undermine copyright owners' control. That epithet helped to obscure the difference between unlicensed uses that invaded defined statutory exclusive rights and other …


Madisonian Fair Use, Michael J. Madison Jan 2012

Madisonian Fair Use, Michael J. Madison

Articles

This short essay reflects on developments in the law, scholarship, and practice of fair use since the publication in 2004 of an earlier article on patterns in fair use practice and adjudication. It synthesizes many of those developments in the idea of “Madisonian” fair use, borrowing the separation of powers metaphor from James Madison’s work on the US Constitution and applying it, lightly and in a preliminary way, to copyright.


The End Of The Work As We Know It, Michael J. Madison Jan 2012

The End Of The Work As We Know It, Michael J. Madison

Articles

This paper takes a new look at the concept of the work of authorship in copyright, known in other systems as the copyright work. It complements inquiries into authorship and originality, extending earlier scholarship on the origins of legal “things” or objects and on the multi-dimensional character of their borders and boundaries.


Foreword: Rulemaking, Democracy, And Torrents Of E-Mail, Nina A. Mendelson Jan 2011

Foreword: Rulemaking, Democracy, And Torrents Of E-Mail, Nina A. Mendelson

Articles

This Foreword is meant as an initial foray into the question of what agencies should do with mass public comments, particularly on broad questions of policy. Part I discusses the extent to which congressional control, presidential control, and agency procedures themselves can ensure that agency decisions are democratically responsive. In view of shortcomings in both congressional and presidential control, I underscore the need to focus closely on rulemaking procedures as a source of democratic responsiveness. The possibility that agencies may be systematically discounting certain public submissions raises difficulties, and I present some examples. Part II makes a preliminary case that …


Knowledge Curation, Michael J. Madison Jan 2011

Knowledge Curation, Michael J. Madison

Articles

This Article addresses conservation, preservation, and stewardship of knowledge, and laws and institutions in the cultural environment that support those things. Legal and policy questions concerning creativity and innovation usually focus on producing new knowledge and offering access to it. Equivalent attention rarely is paid to questions of old knowledge. To what extent should the law, and particularly intellectual property law, focus on the durability of information and knowledge? To what extent does the law do so already, and to what effect? This article begins to explore those questions. Along the way, the article takes up distinctions among different types …


Beyond Invention: Patent As Knowledge Law, Michael J. Madison Jan 2011

Beyond Invention: Patent As Knowledge Law, Michael J. Madison

Articles

The decision of the Supreme Court of the United States in Bilski v. Kappos, concerning the legal standard for determining patentable subject matter under the American Patent Act, is used as a starting point for a brief review of historical, philosophical, and cultural influences on subject matter questions in both patent and copyright law. The article suggests that patent and copyright law jurisprudence was constructed initially by the Court with explicit attention to the relationship between these forms of intellectual property law and the roles of knowledge in society. Over time, explicit attention to that relationship has largely disappeared from …


Unwilling Avatars: Idealism And Discrimination In Cyberspace, Mary Anne Franks Jan 2011

Unwilling Avatars: Idealism And Discrimination In Cyberspace, Mary Anne Franks

Articles

No abstract provided.


Almost Free: An Analysis Of Icann's 'Affirmation Of Commitments', A. Michael Froomkin Jan 2011

Almost Free: An Analysis Of Icann's 'Affirmation Of Commitments', A. Michael Froomkin

Articles

No abstract provided.


Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton Jan 2010

Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton

Articles

While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Reply: The Complexity Of Commons, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg Jan 2010

Reply: The Complexity Of Commons, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg

Articles

Constructing Commons in the Cultural Environment, and responses to that article by Professors Thráinn Eggertsson, Wendy Gordon, Gregg Macey, Robert Merges, Elinor Ostrom, and Lawrence Solum. This short Reply comments briefly on each of those responses.


Some Optimism About Fair Use And Copyright Law, Michael J. Madison Jan 2010

Some Optimism About Fair Use And Copyright Law, Michael J. Madison

Articles

This short paper reflects on the emergence of codes of best practices in fair use, highlighting both the relationship between the best practices approach and an institutional perspective on copyright and the relationship between the best practices approach and social processes of innovation and creativity.


Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Jan 2010

Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Articles

Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social …


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton Jan 2010

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …


Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton Jan 2010

Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton

Articles

The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …


Constructing Commons In The Cultural Environment, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg Jan 2010

Constructing Commons In The Cultural Environment, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg

Articles

This Essay considers the problem of understanding intellectual sharing/pooling arrangements and the construction of cultural commons arrangements. We argue that an adaptation of the approach pioneered by Elinor Ostrom and collaborators to commons arrangements in the natural environment may provide a template for the examination of constructed commons in the cultural environment. The approach promises to lead to a better understanding of how participants in commons and pooling arrangements structure their interactions in relation to the environment(s) within which they are embedded and with which they share interdependent relationships. Such an improved understanding is critical for obtaining a more complete …


Beyond Creativity: Copyright As Knowledge Law, Michael J. Madison Jan 2010

Beyond Creativity: Copyright As Knowledge Law, Michael J. Madison

Articles

The Supreme Court’s copyright jurisprudence of the last 100 years has embraced the creativity trope. Spurred in part by themes associated with the story of “romantic authorship” in the 19th and 20th centuries, copyright critiques likewise ask, “Who is creative?” “How should creativity be protected (or not) and encouraged (or not)?” and “ Why protect creativity?” Policy debates and scholarship in recent years have focused on the concept of creativity in framing copyright disputes, transactions, and institutions, reinforcing the notion that these are the central copyright questions. I suggest that this focus on the creativity trope is unhelpful. I argue …