Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (2)
- Defamation (2)
- Information security (2)
- Regulation (2)
- Administrative Law (1)
-
- Civil actions (1)
- Communications privacy (1)
- Context of the expression (1)
- Defamation suits (1)
- HIPAA (1)
- Healthcare (1)
- Hoeper v. Air Wisconsin (1)
- Hybrid rulemaking (1)
- Injunction on speech and expression (1)
- Injunctive relief (1)
- Journalism standards (1)
- Leveson Report (1)
- Material falsity (1)
- Near v. Minnesota (1)
- New York Times Co. v. United States (1)
- News Corporation (1)
- Phone-jacking scandal (1)
- Privacy (1)
- Public-private partnerships (1)
- Regulatory Capture (1)
- Regulatory capture (1)
- Regulatory delegationcyber (1)
- Rooks v. Krzewski (1)
- Ruper Murdoch (1)
- Surveillance (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi
Articles
No abstract provided.
Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff
Material Falsity In Defamation Cases: The Supreme Court's Call For Contextual Analysis, Charles D. Tobin, Leonard M. Niehoff
Articles
In the book The Phantom Tollbooth, one of the characters, Milo, declares that he comes from a faraway land called Context. After a circuitous journey through many strange cities, bearing names that have meanings Milo struggles to understand, he finds himself back at home in his bedroom.
Context, by and large, is the home base for courts in defining the boundaries between actionable and nonactionable speech. Often, after circuitous travels through precedent and logic, courts meander back to the simple notion that the meaning and legal significance of words are determined by their context.
Communications Privacy For And By Whom?, Ryan Calo
Communications Privacy For And By Whom?, Ryan Calo
Articles
A response to Professor Orin Kerr's The Next Generation Communications Privacy Act, which makes a series of quiet assumptions, however, that readers may find controversial.
First, the Article reads as though ECPA exists only to protect citizens from public officials. According to its text and to case law, however, ECPA also protects private citizens from one another in ways any new act should revisit.
Second, the Article assumes that society should address communications privacy with a statute, whereas specific experiences with ECPA suggest that the courts may be better suited to address communications privacy—for reasons Professor Kerr himself offers. …
The Efficacy Of Cybersecurity Regulation, David Thaw
The Efficacy Of Cybersecurity Regulation, David Thaw
Articles
Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …
Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff
Zombies Among Us: Injunctions In Defamation Cases Come Back From The Dead, Jim Stewart, Leonard M. Niehoff
Articles
Here's a scary thought: an individual, unhappy with negative statements that have been made about him, sues for defamation and persuades the trial court to issue an injunction prohibiting the speaker from engaging in that speech again. An appellate court reviews the injunction and, in large measure, upholds it. This creepy scenario brings shudders to free speech and media advocates, who have long viewed such injunctions as prior restraints that the First Amendment forbids in all but the most extreme and extraordinary cases. As a recent decision from the Michigan Court of Appeals demonstrates, however, decades of United States Supreme …
Enlightened Regulatory Capture, David Thaw
Enlightened Regulatory Capture, David Thaw
Articles
Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …