Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Government (3)
- Information privacy (3)
- Social media (3)
- Software (3)
- Constitutional law (2)
-
- Disclosure (2)
- First Amendment (2)
- Internet (2)
- Licensing (2)
- Social networks (2)
- American Law Institute (1)
- Automated disablement (1)
- BitTorrent (1)
- Blocking (1)
- Civil rights (1)
- Columbia Journal of Law and the Arts (1)
- Comcast (1)
- Constitutional theory (1)
- Copyright infringement (1)
- Copyright law (1)
- Cyber crime (1)
- Cyberlaw (1)
- Cyberspace law (1)
- Digital (1)
- Discrimination (1)
- EO 12866 (1)
- FCC (1)
- FTC (1)
- Forms of expression (1)
- Government Openness (1)
Articles 1 - 16 of 16
Full-Text Articles in Law
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.
To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Section 230 Of The Cda: Internet Exceptionalism As A Statutory Construct, H. Brian Holland
Section 230 Of The Cda: Internet Exceptionalism As A Statutory Construct, H. Brian Holland
Faculty Scholarship
Since its enactment in 1996, Section 230 of the Communications Decency Act has become perhaps the most significant statute in the regulation of online content, and one of the most intensely scrutinized.
The essay begins with a brief introduction to Section 230. As interpreted and applied by the judiciary, this statute is now conceived as a broad grant of immunity from tort liability.—broad not only in terms of those who can claim its protection but also in terms of predicate acts and causes of action to which such immunity extends.
Working from this foundation, I then seek to position the …
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Faculty Scholarship
No abstract provided.
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Faculty Scholarship
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.
In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …
What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds
What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Mainstreaming Privacy Torts, Danielle Keats Citron
Mainstreaming Privacy Torts, Danielle Keats Citron
Faculty Scholarship
In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Faculty Scholarship
The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.
Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale
Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale
Faculty Scholarship
All is not well in the land of online self-regulation. However competently internet intermediaries police their sites, nagging questions will remain about their fairness and objectivity in doing so. Is Comcast blocking BitTorrent to stop infringement, to manage traffic, or to decrease access to content that competes with its own for viewers? How much digital due process does Google need to give a site it accuses of harboring malware? If Facebook censors a video of war carnage, is that a token of respect for the wounded or one more reflexive effort of a major company to ingratiate itself with the …
Privacy As Product Safety, James Grimmelmann
Privacy As Product Safety, James Grimmelmann
Faculty Scholarship
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.
Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …
Government Speech 2.0, Danielle K. Citron, Helen Norton
Government Speech 2.0, Danielle K. Citron, Helen Norton
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss
Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss
Faculty Scholarship
It is a quarter century since I began telling my Administrative Law students that they had better be watching the Internet and how agencies of interest to them were using it, as they entered an Information Age career. The changes since then have been remarkable. Rulemaking, where the pace has perhaps been slowest, is now accelerating into the Internet, driven by a President committed to openness and consultation. This paper seeks little more than to point the reader toward the places where she can find the changes and watch them for herself.
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Defending Disclosure In Software Licensing, Maureen A. O'Rourke
Faculty Scholarship
For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).
The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …
Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen A. O'Rourke
Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen A. O'Rourke
Faculty Scholarship
The final draft of the Principles of the Law of Software Contracts ("Principles") was unanimously approved bythe American Law Institute membership in May of 2009. The goal of the project is to “clarify and unify thelaw of software transactions.” However, the Principles will not become law in any jurisdiction unless and until a court adopts them, so only time will tell whether the project will accomplish this goal. Nevertheless, one thing is certain. The current law of software transactions, a mish-mash of common law, Article 2 of theUniform Commercial Code, and federal intellectual property law, among other things, is in …
International Issues: Which Country's Law Applies When Works Are Made Available Over The Internet, Jane C. Ginsburg
International Issues: Which Country's Law Applies When Works Are Made Available Over The Internet, Jane C. Ginsburg
Faculty Scholarship
My topic is International Implications, a topic that would not exist but for the Internet. When access to archival materials was on a physical basis, patrons came to the archive and consulted the material on site; the material did not leave the archive, much less get sent overseas. Even digitized materials, if consulted on site, do not present the problems that arise if the archives puts this material on a website, which is accessible around the world, that ubiquity being the default condition ofthe Internet.
Let us consider some problems that might arise and which have international consequences. First of …