Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen Dec 2014

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen

Faculty Scholarship

The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States …


Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale Dec 2014

Promoting Innovation While Preventing Discrimination: Policy Goals For The Scored Society, Danielle K. Citron, Frank Pasquale

Faculty Scholarship

There are several normative theories of jurisprudence supporting our critique of the scored society, which complement the social theory and political economy presented in our 2014 article on that topic in the Washington Law Review. This response to Professor Tal Zarsky clarifies our antidiscrimination argument while showing that is only one of many bases for the critique of scoring practices. The concerns raised by Big Data may exceed the capacity of extant legal doctrines. Addressing the potential injustice may require the hard work of legal reform.


Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose Dec 2014

Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose

Faculty Scholarship

This paper takes a closer look at the First Amendment rights of college athletes to access social media while simultaneously participating in intercollegiate athletics. The question posed is quite simple: can a coach or athletic department at a public university legally restrict a student-athlete's use of social media? If so, does the First Amendment provide any restraints on the type or length of restrictions that can be imposed? Thus far, neither question has been presented to a court for resolution. However, the answers are vital, as college coaches and athletic directors seek to regulate their athletes in a constitutional manner.


Tinkering With Success: College Athletes, Social Media And The First Amendment, Meg Penrose Oct 2014

Tinkering With Success: College Athletes, Social Media And The First Amendment, Meg Penrose

Faculty Scholarship

Good law does not always make good policy. This article seeks to provide a legal assessment, not a policy directive. The policy choices made by individual institutions and athletic departments should be guided by law, but absolutely left to institutional discretion. Many articles written on college student-athletes' social media usage attempt to urge policy directives clothed in constitutional analysis.

In this author's opinion, these articles have lost perspective-constitutional perspective. This article seeks primarily to provide a legal and constitutional assessment so that schools and their athletic departments will have ample information to then make their own policy choices.


Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks Jul 2014

Criminalizing Revenge Porn, Danielle K. Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale

Faculty Scholarship

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Speech Engines, James Grimmelmann Jan 2014

Speech Engines, James Grimmelmann

Faculty Scholarship

Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.

A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …


Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks Jan 2014

Criminalizing Revenge Porn, Danielle Keats Citron, Mary Anne Franks

Faculty Scholarship

Violations of sexual privacy, notably the non-consensual publication of sexually graphic images in violation of someone's trust, deserve criminal punishment. They deny subjects' ability to decide if and when they are sexually exposed to the public and undermine trust needed for intimate relationships. Then too they produce grave emotional and dignitary harms, exact steep financial costs, and increase the risks of physical assault. A narrowly and carefully crafted criminal statute can comport with the First Amendment. The criminalization of revenge porn is necessary to protect against devastating privacy invasions that chill self-expression and ruin lives.


The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale Jan 2014

The Scored Society: Due Process For Automated Predictions, Danielle Keats Citron, Frank A. Pasquale

Faculty Scholarship

Big Data is increasingly mined to rank and rate individuals. Predictive algorithms assess whether we are good credit risks, desirable employees, reliable tenants, valuable customers—or deadbeats, shirkers, menaces, and “wastes of time.” Crucial opportunities are on the line, including the ability to obtain loans, work, housing, and insurance. Though automated scoring is pervasive and consequential, it is also opaque and lacking oversight. In one area where regulation does prevail—credit—the law focuses on credit history, not the derivation of scores from data.

Procedural regularity is essential for those stigmatized by “artificially intelligent” scoring systems. The American due process tradition should inform …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Rethinking Privacy, William H. Simon Jan 2014

Rethinking Privacy, William H. Simon

Faculty Scholarship

Anxiety about surveillance and data mining has led many to embrace implausibly expansive and rigid conceptions of privacy. The premises of some current privacy arguments do not fit well with the broader political commitments of those who make them. In particular, liberals seem to have lost touch with the reservations about privacy expressed in the social criticism of some decades ago. They seem unable to imagine that preoccupation with privacy might amount to a “pursuit of loneliness” or how “eyes on the street” might have reassuring connotations. Without denying the importance of the effort to define and secure privacy values, …


Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain Jan 2014

Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain

Faculty Scholarship

Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe Jan 2014

Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe

Faculty Scholarship

This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …


Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu Jan 2014

Sender Side Transmission Rules For The Internet, Tejas N. Narechania, Tim Wu

Faculty Scholarship

Since 1966, the Federal Communications Commission has, one way or another, protected businesses that deliver services over the nation’s communications infrastructure. But in January 2014, the U.S. Court of Appeals for the D.C. Circuit struck down the FCC’s net neutrality rules contained in its 2010 Open Internet Order. FCC Chairman Tom Wheeler has since indicated that he will take up the D.C. Circuit’s invitation to implement rules that, consistent with historic practice, “will meet the court’s test for preventing improper blocking of and discrimination among Internet traffic.”

Chairman Wheeler’s statement invites an obvious question: presuming that the FCC wants …