Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron Jun 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.

To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Section 230 Of The Cda: Internet Exceptionalism As A Statutory Construct, H. Brian Holland Jan 2010

Section 230 Of The Cda: Internet Exceptionalism As A Statutory Construct, H. Brian Holland

Faculty Scholarship

Since its enactment in 1996, Section 230 of the Communications Decency Act has become perhaps the most significant statute in the regulation of online content, and one of the most intensely scrutinized.

The essay begins with a brief introduction to Section 230. As interpreted and applied by the judiciary, this statute is now conceived as a broad grant of immunity from tort liability.—broad not only in terms of those who can claim its protection but also in terms of predicate acts and causes of action to which such immunity extends.

Working from this foundation, I then seek to position the …


Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale Jan 2010

Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale

Faculty Scholarship

No abstract provided.


Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron Jan 2010

Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron

Faculty Scholarship

The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …


Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry Jan 2010

Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry

Faculty Scholarship

Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.

In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …


What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds Jan 2010

What's Software Got To Do With It? The Ali Principles Of The Law Of Software Contracting, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In May, 2009, the American Law Institute (“ALI”) approved its Principles of the Law of Software Contracts (“Principles”). The attempt to codify, or at least unify, the law of software contracts has a long and contentious history, the roots of which can be found in the attempt to add an Article 2B to the Uniform Commercial Code (“UCC”) in the mid-1990s. Article 2B became the Uniform Computer Information Transactions Act (“UCITA”) when the ALI withdrew from the project in 1999, and UCITA became the law in only two states, Virginia and Maryland. UCITA became a dirty word, with several states …


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Jan 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Mainstreaming Privacy Torts, Danielle Keats Citron Jan 2010

Mainstreaming Privacy Torts, Danielle Keats Citron

Faculty Scholarship

In 1890, Samuel Warren and Louis Brandeis proposed a privacy tort and seventy years later, William Prosser conceived it as four wrongs. In both eras, privacy invasions primarily caused psychic and reputational wounds of a particular sort. Courts insisted upon significant proof due to those injuries’ alleged ethereal nature. Digital networks alter this calculus by exacerbating the injuries inflicted. Because humiliating personal information posted online has no expiration date, neither does individual suffering. Leaking databases of personal information and postings that encourage assaults invade privacy in ways that exact significant financial and physical harm. This dispels concerns that plaintiffs might …


Cyber Civil Rights: Looking Forward, Danielle Keats Citron Jan 2010

Cyber Civil Rights: Looking Forward, Danielle Keats Citron

Faculty Scholarship

The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.


Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale Jan 2010

Trusting (And Verifying) Online Intermediaries' Policing, Frank A. Pasquale

Faculty Scholarship

All is not well in the land of online self-regulation. However competently internet intermediaries police their sites, nagging questions will remain about their fairness and objectivity in doing so. Is Comcast blocking BitTorrent to stop infringement, to manage traffic, or to decrease access to content that competes with its own for viewers? How much digital due process does Google need to give a site it accuses of harboring malware? If Facebook censors a video of war carnage, is that a token of respect for the wounded or one more reflexive effort of a major company to ingratiate itself with the …


Privacy As Product Safety, James Grimmelmann Jan 2010

Privacy As Product Safety, James Grimmelmann

Faculty Scholarship

Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …


Government Speech 2.0, Danielle K. Citron, Helen Norton Jan 2010

Government Speech 2.0, Danielle K. Citron, Helen Norton

Faculty Scholarship

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss Jan 2010

Implications Of The Internet For Quasi-Legislative Instruments Of Regulation, Peter L. Strauss

Faculty Scholarship

It is a quarter century since I began telling my Administrative Law students that they had better be watching the Internet and how agencies of interest to them were using it, as they entered an Information Age career. The changes since then have been remarkable. Rulemaking, where the pace has perhaps been slowest, is now accelerating into the Internet, driven by a President committed to openness and consultation. This paper seeks little more than to point the reader toward the places where she can find the changes and watch them for herself.


Defending Disclosure In Software Licensing, Maureen A. O'Rourke Jan 2010

Defending Disclosure In Software Licensing, Maureen A. O'Rourke

Faculty Scholarship

For lack of our imagination, this article does not have the most scintillating title. However, the subject matter is critically important. We survey prominent kinds of disclosures in law and show why the disclosure tool, though subject to substantial criticism, is central to the legitimacy of any legal regime. Our working example is the American Law Institute’s “Principles of the Law of Software Contracts” (hereinafter “ALI Principles”).

The ALI Principles include three kinds of disclosure: disclosure of facts (concerning the quality of software),disclosure of terms (of standard forms), and disclosure of post-contract intentions (to pursue remote disablement of software). We …


Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen A. O'Rourke Jan 2010

Principles Of The Law Of Software Contracts: Some Highlights, Robert A. Hillman, Maureen A. O'Rourke

Faculty Scholarship

The final draft of the Principles of the Law of Software Contracts ("Principles") was unanimously approved bythe American Law Institute membership in May of 2009. The goal of the project is to “clarify and unify thelaw of software transactions.” However, the Principles will not become law in any jurisdiction unless and until a court adopts them, so only time will tell whether the project will accomplish this goal. Nevertheless, one thing is certain. The current law of software transactions, a mish-mash of common law, Article 2 of theUniform Commercial Code, and federal intellectual property law, among other things, is in …


International Issues: Which Country's Law Applies When Works Are Made Available Over The Internet, Jane C. Ginsburg Jan 2010

International Issues: Which Country's Law Applies When Works Are Made Available Over The Internet, Jane C. Ginsburg

Faculty Scholarship

My topic is International Implications, a topic that would not exist but for the Internet. When access to archival materials was on a physical basis, patrons came to the archive and consulted the material on site; the material did not leave the archive, much less get sent overseas. Even digitized materials, if consulted on site, do not present the problems that arise if the archives puts this material on a website, which is accessible around the world, that ubiquity being the default condition ofthe Internet.

Let us consider some problems that might arise and which have international consequences. First of …