Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (7)
- Columbia Law School (4)
- Schulich School of Law, Dalhousie University (3)
- Maurer School of Law: Indiana University (2)
- University of Pennsylvania Carey Law School (2)
-
- University of Pittsburgh School of Law (2)
- Florida A&M University College of Law (1)
- Fordham Law School (1)
- New York Law School (1)
- Notre Dame Law School (1)
- Pace University (1)
- University of Colorado Law School (1)
- University of Missouri-Kansas City School of Law (1)
- Yeshiva University, Cardozo School of Law (1)
- Keyword
-
- Privacy (8)
- Communications Law (5)
- Internet (4)
- Technology (4)
- Telecommunications (4)
-
- Evidence (3)
- First Amendment (3)
- International Law (3)
- Law (3)
- Censorship (2)
- Constitution (2)
- Copyright (2)
- Criminal Law (2)
- Information Privacy (2)
- International Law: History (2)
- Internet Censorship (2)
- Regulation (2)
- Surveillance (2)
- Telecommunications History (2)
- Web 2.0 (2)
- "free flow" of information (1)
- AI (1)
- AWS (1)
- Academic Freedom (1)
- Administrative law (1)
- Age (1)
- Arbitration (1)
- Artificial intelligence (1)
- Autonomous weapon systems (1)
- Blind (1)
- Publication Year
- Publication
-
- Articles in Law Reviews & Other Academic Journals (5)
- Faculty Scholarship (4)
- Articles, Book Chapters, & Popular Press (3)
- All Faculty Scholarship (2)
- Articles (2)
-
- Articles by Maurer Faculty (2)
- Articles & Chapters (1)
- Columbia Center on Sustainable Investment Staff Publications (1)
- Faculty Articles (1)
- Faculty Works (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal Articles (1)
- Journal Publications (1)
- Pace International Law Review Online Companion (1)
- Publications (1)
- Upper Level Writing Requirement Research Papers (1)
Articles 1 - 28 of 28
Full-Text Articles in International Law
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
Responding To Mass, Computer-Generated, And Malattributed Comments, Steven J. Balla, Reeve Bull, Bridget C.E. Dooling, Emily Hammond, Michael A. Livermore, Michael Herz, Beth Simone Noveck
Responding To Mass, Computer-Generated, And Malattributed Comments, Steven J. Balla, Reeve Bull, Bridget C.E. Dooling, Emily Hammond, Michael A. Livermore, Michael Herz, Beth Simone Noveck
Faculty Articles
A number of technological and political forces have transformed the once staid and insider dominated notice-and-comment process into a forum for large scale, sometimes messy, participation in regulatory decisionmaking. It is not unheard of for agencies to receive millions of comments on rulemakings; often these comments are received as part of organized mass comment campaigns. In some rulemakings, questions have been raised about whether public comments were submitted under false names, or were automatically generated by computer “bot” programs. In this Article, we examine whether and to what extent such submissions are problematic and make recommendations for how rulemaking agencies …
Copyright And Disability, Blake E. Reid
Copyright And Disability, Blake E. Reid
Publications
A vast array of copyrighted works—books, video programming, software, podcasts, video games, and more—remain inaccessible to people with disabilities. International efforts to adopt limitations and exceptions to copyright law that permit third parties to create and distribute accessible versions of books for people with print disabilities have drawn some attention to the role that copyright law plays in inhibiting the accessibility of copyrighted works. However, copyright scholars have not meaningfully engaged with the role that copyright law plays in the broader tangle of disability rights.
Indecency Regulation Of The Fcc And Censorship Law In Republic Korea: Comparison And Contrasts, Min-Soo "Minee" Roh
Indecency Regulation Of The Fcc And Censorship Law In Republic Korea: Comparison And Contrasts, Min-Soo "Minee" Roh
Upper Level Writing Requirement Research Papers
Regulating music on radio or television is not a straightforward process, as the music is comprised of lyrics of words. On top of the lyrics, any music performance has an additional layer of choreography and dress code. If any individual elements or combined elements is obscene or indecent, the government attempts to regulate broadcasting both music and performance. This leads to regulating general speech on communications and it requires this paper to look into regulation of broadcasting in general and specific examples of music broadcasting regulation on radio and television, particularly, in the United States (“States”) and in Republic of …
Speech Across Borders, Jennifer Daskal
Speech Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …
Privacy And Security Across Borders, Jennifer Daskal
Privacy And Security Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Three recent initiatives -by the United States, European Union, and Australiaare opening salvos in what will likely be an ongoing and critically important debate about law enforcement access to data, the jurisdictional limits to such access, and the rules that apply. Each of these developments addresses a common set of challenges posed by the increased digitalization of information, the rising power of private companies delimiting access to that information, and the cross-border nature of investigations that involve digital evidence. And each has profound implications for privacy, security, and the possibility of meaningful democratic accountability and control. This Essay analyzes the …
User-Generated Evidence, Rebecca Hamilton
User-Generated Evidence, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …
Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal
Microsoft Ireland, The Cloud Act, And International Lawmaking 2.0, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
On March 23, President Trump signed the CLOUD Act, 1 thereby mooting one of the most closely watched Supreme Court cases this term: the Microsoft Ireland case. 2 This essay examines these extraordinary and fast-moving developments, explaining how the Act resolves the Supreme Court case and addresses the complicated questions of jurisdiction over data in the cloud. The developments represent a classic case of international lawmaking via domestic regulation, as mediated by major multinational corporations that manage so much of the world's data.
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Faculty Scholarship
An international public debate over the law and ethics of autonomous weapon systems (AWS) has been underway since 2012, with those urging legal regulation of AWS under existing principles and requirements of the international law of armed conflict, on the one side, in argument with opponents who favor, instead, a preemptive international treaty ban on all such weapons, on the other. This Chapter provides an introduction to this international debate, offering the main arguments on each side. These include disputes over defining an AWS, the morality and law of automated targeting and target selection by machine, and the interaction of …
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney
Articles, Book Chapters, & Popular Press
Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …
Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda
Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda
Columbia Center on Sustainable Investment Staff Publications
The initial phase of the Leveraging Mining-Related Infrastructure Investments for Development project consisted of a worldwide survey of regulatory, commercial and operating case studies of shared use of mining-related infrastructure. This Policy Paper delivers the findings for internet and telecommunications.
Introductory Note To The Final Acts Of The World Conference On International Telecommunications, David P. Fidler
Introductory Note To The Final Acts Of The World Conference On International Telecommunications, David P. Fidler
Articles by Maurer Faculty
On December 14, 2012, member states of the International Telecommunication Union (ITU) approved the Final Acts of the World Conference on International Telecommunications. The ITU is the specialized agency of the United Nations fostering cooperation on information and communication technologies, and, through world conferences, it periodically revises the International Telecommunication Regulations (ITRs), a treaty the ITU adopted in 1988.2 However, in December 2012, the Final Acts, the manner in which they were approved, and the World Conference proved controversial, and these controversies will adversely affect the impact of the Final Acts and the revised ITRs on international telecommunications law.
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Communications Disruption And Censorship Under International Law: History Lessons, Jonathon Penney
Articles, Book Chapters, & Popular Press
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communications technologies have been disrupted or censored — telegram cable cutting and censorship, high frequency radio jamming, and direct broadcast satellite blocking — and how the world community responded to that disruption or censorship through international law and law making. In …
Craigslist, The Cda, And Inconsistent International Standards Regarding Liability For Third-Party Postings On The Internet, Peter Adamo
Pace International Law Review Online Companion
This Comment explores the nature and purpose of the Communications Decency Act (CDA), the legislative upbringing, and the application of the CDA to Craigslist. It compares the CDA to approaches taken abroad through legislation and judicial proceedings. It explains, contrary to the one other commentator to broach the subject matter, how the CDA continues to provide robust protection to Craigslist. Finally, it explores potential avenues for redrafting the CDA as well as the difficulties and trade-offs associated with implementing such change.
Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney
Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney
Articles, Book Chapters, & Popular Press
If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …
Baum Lecture 2010, Lee C. Bollinger
Baum Lecture 2010, Lee C. Bollinger
Faculty Scholarship
As part of the Baum Lecture Series at the University of Illinois College of Law, Columbia University President Lee C. Bollinger delivered a lecture on September 14, 2010, on the essential role of a global free press in providing the information needed to understand the many problematic issues we face as a result of globalization. In this presentation, President Bollinger addressed the challenges of maintaining high-quality institutions of American journalism with an international reporting capacity in the face of rapidly changing market forces. He further discussed America’s interest in seeing the rise of a free and independent press in nations …
Mapping Online Privacy, Jacqueline D. Lipton
Mapping Online Privacy, Jacqueline D. Lipton
Articles
Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Articles
“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …
Inter-American System, Claudia Martin
Inter-American System, Claudia Martin
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Is Open Source Software The New Lex Mercatoria?, Fabrizio Marrella, Christopher S. Yoo
Is Open Source Software The New Lex Mercatoria?, Fabrizio Marrella, Christopher S. Yoo
All Faculty Scholarship
Early Internet scholars proclaimed that the transnational nature of the Internet rendered it inherently unregulable by conventional governments. Instead, the Internet would be governed by customs and practices established by the end user community in a manner reminiscent of the lex mercatoria, which spontaneously emerged during medieval times to resolve international trade disputes independently and autonomously from national law. Subsequent events have revealed these claims to have been overly optimistic, as national governments have evinced both the inclination and the ability to exert influence, if not outright control, over the physical infrastructure, the domain name system, and the content flowing …
The Media As Participants In The International Legal Process, Monica Hakimi
The Media As Participants In The International Legal Process, Monica Hakimi
Faculty Scholarship
We know what we know about current international events through the media. The media (with their instantaneous transmission of images and sound across great distances) inform us of everything from the train bombings in Madrid and London, to human rights abuses in Darfur, to the fall of Saddam Hussein’s Iraq. Yet the media do not simply communicate raw information; they selectively filter, define and give shape to the events that they cover — in terms of what is happening, whether it is appropriate, and how relevant international actors should and do respond. The media thus are the nerves of the …
Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh
Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh
All Faculty Scholarship
Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …
Le Droit Et Les Reseaux Internationaux D'Information, Joel R. Reidenberg
Le Droit Et Les Reseaux Internationaux D'Information, Joel R. Reidenberg
Faculty Scholarship
Travaux pour obtenir le grade de Docteur De L'Universite Paris I. Discipline: Droit. Sujet des publications: Le Droit Et Les Reseaux Internationaux D'Information
A Pragmatic Approach To Meaning In Defamation Law, Jeffrey E. Thomas
A Pragmatic Approach To Meaning In Defamation Law, Jeffrey E. Thomas
Faculty Works
No abstract provided.
The First Amendment And The International "Free Flow" Of Information, Fred H. Cate
The First Amendment And The International "Free Flow" Of Information, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
The Northern Ireland Broadcasting Ban: Some Reflections On Judicial Review, Geoffrey Bennett, Russell L. Weaver
The Northern Ireland Broadcasting Ban: Some Reflections On Judicial Review, Geoffrey Bennett, Russell L. Weaver
Journal Articles
This Essay initially examines the British government's ban on its broadcasting networks that restricts coverage of Northern Ireland organizations, and concludes by making some reflections on the system of judicial review in the United States. Professors Weaver and Bennett note that a comparable ban in the United States probably would be held unconstitutional. In Great Britain, however, the courts lack a similar power of judicial review, leaving the question of the Ban's legitimacy to the political process. While Great Britain enjoys a relatively free society, the authors conclude that government control over the British media poses troubling problems and suggests …
Human Rights And The Free Flow Of Information, Lung-Chu Chen
Human Rights And The Free Flow Of Information, Lung-Chu Chen
Articles & Chapters
"Human Rights and the Free Flow of Information." This topic immediately raises three key questions: the appropriate conception of human rights; the scope and reach of freedom of information; and finally, the bearing of one upon the other.