Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi Jan 2014

Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi

Articles

No abstract provided.


Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff Jan 2014

Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff

Articles

In the book The Phantom Tollbooth, one of the characters, Milo, declares that he comes from a faraway land called Context. After a circuitous journey through many strange cities, bearing names that have meanings Milo struggles to understand, he finds himself back at home in his bedroom.

Context, by and large, is the home base for courts in defining the boundaries between actionable and nonactionable speech. Often, after circuitous travels through precedent and logic, courts meander back to the simple notion that the meaning and legal significance of words are determined by their context.


The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Communications Privacy For And By Whom?, Ryan Calo Jan 2014

Communications Privacy For And By Whom?, Ryan Calo

Articles

A response to Professor Orin Kerr's The Next Generation Communications Privacy Act, which makes a series of quiet assumptions, however, that readers may find controversial.

First, the Article reads as though ECPA exists only to protect citizens from public officials. According to its text and to case law, however, ECPA also protects private citizens from one another in ways any new act should revisit.

Second, the Article assumes that society should address communications privacy with a statute, whereas specific experiences with ECPA suggest that the courts may be better suited to address communications privacy—for reasons Professor Kerr himself offers. …


Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff Jan 2014

Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff

Articles

Here's a scary thought: an individual, unhappy with negative statements that have been made about him, sues for defamation and persuades the trial court to issue an injunction prohibiting the speaker from engaging in that speech again. An appellate court reviews the injunction and, in large measure, upholds it. This creepy scenario brings shudders to free speech and media advocates, who have long viewed such injunctions as prior restraints that the First Amendment forbids in all but the most extreme and extraordinary cases. As a recent decision from the Michigan Court of Appeals demonstrates, however, decades of United States Supreme …