Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Cornell University Law School

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 32

Full-Text Articles in Internet Law

Defamation 2.0, Cortelyou C. Kenney Mar 2023

Defamation 2.0, Cortelyou C. Kenney

Cornell Law Faculty Publications

There is a literal prohibition in the media bar that media lawyers cannot represent plaintiffs in suits for defamation. The stated principle behind this rule—a rule that can result in excommunication from the premier media law organization if it is violated—is that playing both sides of the defamation game is disloyal to traditional media actors because any chance of victory could inadvertently distort the law of defamation to increase the risk of frivolous suits against media outlets or other innocent third parties. But has the maxim finally gone too far?

Fueled by a new model where media profits are driven …


Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann Jan 2020

Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann

Cornell Law Faculty Publications

No abstract provided.


Money's Past Is Fintech's Future: Wildcat Crypto, The Digital Dollar, And Citizen Central Banking, Robert C. Hockett Jun 2019

Money's Past Is Fintech's Future: Wildcat Crypto, The Digital Dollar, And Citizen Central Banking, Robert C. Hockett

Cornell Law Faculty Publications

This Essay argues that crypto-currencies will soon go the way of the ‘wildcat’ banknotes of the mid-19th century. As central banks worldwide upgrade their payments systems, the Fed will begin issuing a ‘digital dollar’ that leaves no licit function for what the Author calls ‘wildcat crypto.’ But the imminent change heralds more than a shakeout in fintech. It will also make possible a new era of what the Author calls ‘Citizen Central Banking.’ The Fed will administer a national system of ‘Citizen Accounts.’ This will not only end the problem of the ‘unbanked,’ it will also simplify monetary policy. Instead …


Lawyers' Abuse Of Technology, Cheryl B. Preston May 2018

Lawyers' Abuse Of Technology, Cheryl B. Preston

Cornell Law Review

Lawyers are highly educated and, allegedly, of higher than average intelligence, but sometimes individual lawyers demonstrate colossal errors in judgment, especially when insufficiently trained in the new and emerging risks involved with the technological age. For instance, although the internet is a necessary tool for attorneys' and is now a prominent feature in the everyday lives of all actors in the legal system, this technology poses particularized and often unanticipated risks of professional and ethical abuse -- risks that are extraordinary both in quantity and intensity. As Harvard's Director of the Center for the Legal Profession warned: We are "only …


“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng Apr 2018

“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng

Cornell International Law Journal

We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.


International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof Mar 2018

International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof

Cornell Law Review

States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.

This Article draws on tort law and international law principles to construct …


The Unstoppable Intrusion: The Unique Effect Of Online Harassment And What The United States Can Ascertain From Other Countries' Attempts To Prevent It, Dylan E. Penza Jan 2018

The Unstoppable Intrusion: The Unique Effect Of Online Harassment And What The United States Can Ascertain From Other Countries' Attempts To Prevent It, Dylan E. Penza

Cornell International Law Journal

The United States must provide some solution to deal with online harassment. Looking at its fellow nations may be a good way to provide a foundation for changes that need to be made


Consumer Internet Standard Form Contracts In India: A Proposal, Robert A. Hillman Jan 2017

Consumer Internet Standard Form Contracts In India: A Proposal, Robert A. Hillman

Cornell Law Faculty Publications

India's burgeoning Internet commerce sector has made consumers susceptible to standard-form contracts. Due to the slim likelihood of consumers reading the terms, vendors may often draft heavy-handed terms in the contracts, thereby adversely impacting consumer interests. The Indian legal framework in this regard is inadequate. This article evaluates the existing suggestions on standard-form contracts and argues that none of them safeguard consumer interests sufficiently. Instead, based on the American Law Institutes' Principles of the Law of Software Contracts, the article proposes a disclosure approach that would benefit the interests of Indian consumers engaged in commerce on the Internet.


Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton Jul 2016

Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton

Cornell Law Faculty Publications

In "Against Data Exceptionalism," Andrew K. Woods explores “one of the greatest societal and technological shifts in recent years,” which manifests in the “same old” questions about government power. The global cloud is an important feature of modern technological life that has significant consequences for individual privacy, law enforcement, and governance. Yet, as Woods suggests, the legal challenges presented by the cloud have analogies in age-old puzzles of public and private international law.

Identifying these connections is a conceptual advance, and this contribution should not be understated. But, to my mind, the most telling statement in Woods’s excellent article comes …


Copyright For Literate Robots, James Grimmelmann Jan 2016

Copyright For Literate Robots, James Grimmelmann

Cornell Law Faculty Publications

Almost by accident, copyright has concluded that copyright law is for humans only: reading performed by computers doesn't count as infringement. Conceptually, this makes sense: copyright's ideal of romantic readership involves humans writing for other humans. But in an age when more and more manipulation of copyrighted works is carried out by automated processes, this split between human reading (infringement) and robotic reading (exempt) has odd consequences and creates its own tendencies toward a copyright system in which humans occupy a surprisingly peripheral place. This essay describes the shifts in fair use law that brought us here and reflects on …


Future Of Ai And Law, Abby Cessna Apr 2015

Future Of Ai And Law, Abby Cessna

Cornell Law School J.D. Student Research Papers

Technology has already transformed the way that law is practiced. The use of computers and digital legal resources, such as LexisNexis and Westlaw have been around for decades, but these are just some of the major technological advancements that have transformed law. For instance, it was groundbreaking for a law firm as prestigious as Orrick, Herrington & Sutcliffe to have a website in the late 1990's, which was getting around 5000 visits a week. Now law firms not only have websites but also use a variety of social media services to promote their firm and services. In addition to promoting …


Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues Apr 2015

Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues

Cornell Law School J.D. Student Research Papers

Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.

This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …


The Virtues Of Moderation, James Grimmelmann Apr 2015

The Virtues Of Moderation, James Grimmelmann

Cornell Law Faculty Publications

On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.

The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town meetings …


Law And Ethics Of Experiments On Social Media Users, James Grimmelmann Jan 2015

Law And Ethics Of Experiments On Social Media Users, James Grimmelmann

Cornell Law Faculty Publications

If you were on Facebook in January 2012, there is a chance that it tried to make you sad. If you were on OkCupid, there is a chance that it tried to match you up with someone incompatible. These were social psychology experiments: Facebook and OkCupid systematically manipulated people's environments to test their reactions. Academics doing similar experiments in a university setting would typically need to obtain informed consent from participants and approval from an Institutional Review Board (IRB). But Facebook and OkCupid, and the academics working with Facebook, had neither. This, I believe, is a problem.

These experiments offer …


Speech Engines, James Grimmelmann Feb 2014

Speech Engines, James Grimmelmann

Cornell Law Faculty Publications

Academic and regulatory debates about Google are dominated by two opposing theories of what search engines are and how law should treat them. Some describe search engines as passive, neutral conduits for websites’ speech; others describe them as active, opinionated editors: speakers in their own right. The conduit and editor theories give dramatically different policy prescriptions in areas ranging from antitrust to copyright. But they both systematically discount search users’ agency, regarding users merely as passive audiences.

A better theory is that search engines are not primarily conduits or editors, but advisors. They help users achieve their diverse and individualized …


The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann Jan 2013

The Illegal Process: Basic Problems In The Making And Application Of Censorship, James Grimmelmann

Cornell Law Faculty Publications

This essay is a response to Derek Bambauer's article Orwell's Armchair, which proposes "[a] statute enabling censorship of Internet material." Bambauer's theory is process-oriented: it focuses on the institutions that engage in censorship and the procedures that they follow. Accordingly, the essay examines his arguments through the lens of the canonical Legal Process text: Hart and Sacks' The Legal Process. A series of notes and queries inquire whether his proposed statute would limit censorship, regularize it, or legitimate it.


Sealand, Havenco, And The Rule Of Law, James Grimmelmann Jan 2012

Sealand, Havenco, And The Rule Of Law, James Grimmelmann

Cornell Law Faculty Publications

In 2000, a group of American entrepreneurs moved to a former World War II anti-aircraft platform in the North Sea, seven miles off the British coast, and launched HavenCo, one of the strangest start-ups in Internet history. A former pirate radio broadcaster, Roy Bates, had occupied the platform in the 1960s, moved his family aboard, and declared it to be the sovereign Principality of Sealand. HavenCo's founders were opposed to governmental censorship and control of the Internet; by putting computer servers on Sealand, they planned to create a "data haven" for unpopular speech, safely beyond the reach of any other …


The Internet Is A Semicommons, James Grimmelmann May 2010

The Internet Is A Semicommons, James Grimmelmann

Cornell Law Faculty Publications

The Internet is a semicommons. Private property in servers and network links coexists with a shared communications platform. This distinctive combination both explains the Internet's enormous success and illustrates some of its recurring problems.

Building on Henry Smith's theory of the semicommons in the medieval open-field system, this essay explains how the dynamic interplay between private and common uses on the Internet enables it to facilitate worldwide sharing and collaboration without collapsing under the strain of misuse. It shows that key technical features of the Internet, such as its layering of protocols and the Web's division into distinct "sites," respond …


Privacy As Product Safety, James Grimmelmann Jan 2010

Privacy As Product Safety, James Grimmelmann

Cornell Law Faculty Publications

Online social media confound many of our familiar expectations about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.

Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …


Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke Jan 2010

Rethinking Consideration In The Electronic Age, Robert A. Hillman, Maureen O'Rourke

Cornell Law Faculty Publications

Our fast-paced age of electronic agreements that ostensibly govern transactions as diverse as downloading software, ordering goods, and engaging in collaborative development projects raises questions regarding the suitability of contract law as the appropriate legal framework. While this question arises in many settings, we focus here on the free and open source software (FOSS) movement because of the maturity and success of its model and the ubiquity of its software. We explore in particular whether open source licenses are supported by consideration, and argue that they are, and that open source licenses are contracts. We further argue that a contractual …


Saving Facebook, James Grimmelmann May 2009

Saving Facebook, James Grimmelmann

Cornell Law Faculty Publications

This Article provides the first comprehensive analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It explains how Facebook users socialize on the site, why they misunderstand the risks involved, and how their privacy suffers as a result. Facebook offers a socially compelling platform that also facilitates peer-to-peer privacy violations: users harming each others' privacy interests. These two facts are inextricably linked; people use Facebook with the goal of sharing some information about themselves. Policymakers cannot make Facebook completely safe, but they can help people use it safely.

The Article makes …


The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann Apr 2009

The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann

James Grimmelmann

For the past four years, Google has been systematically making digital copies of books in the collections of many major university libraries. It made the digital copies searchable through its web site--you couldn't read the books, but you could at least find out where the phrase you're looking for appears within them. This outraged copyright owners, who filed a class action lawsuit to make Google stop. Then, last fall, the parties to this large class action announced an even larger settlement: one that would give Google a license not only to scan books, but also to sell them.

The settlement …


The Google Dilemma, James Grimmelmann Jan 2009

The Google Dilemma, James Grimmelmann

Cornell Law Faculty Publications

Web search is critical to our ability to use the Internet. Whoever controls search engines has enormous influence on all of us; whoever controls the search engines, perhaps, controls the Internet itself. This short essay (based on talks given in January and April 2008) uses the stories of five famous search queries to illustrate the conflicts over search and the enormous power Google wields in choosing whose voices are heard on the Internet.


Accidental Privacy Spills, James Grimmelmann Jul 2008

Accidental Privacy Spills, James Grimmelmann

Cornell Law Faculty Publications

The realm of privacy law has more crimes than criminals, more wrongs than wrongdoers. Some invasions of privacy are neither intentional nor negligent; it's easy to recognize the harm, but hard to pin the blame.

Laurie Garrett attended the World Economic Forum as a journalist and wrote a private email to a few close friends, only to see that email end up on a widely-read weblog.

This essay tells the story of that inevitable accident: an "accident" in that it needn't have happened, but "inevitable" in that there's no principled way to prevent similar misunderstandings from recurring, again and again …


Information Policy For The Library Of Babel, James Grimmelmann Jan 2008

Information Policy For The Library Of Babel, James Grimmelmann

Cornell Law Faculty Publications

The image of Borges's Library of Babel, which contains all possible books, is haunting and suggestive. This essay asks what we would do if we were advising a Federal Library Commission on how to deal with the Library's vast holdings and overwhelming disorganization. This thought exercise provides a set of sensible principles for information policy in an age of extreme informational abundance.


The Structure Of Search Engine Law, James Grimmelmann Nov 2007

The Structure Of Search Engine Law, James Grimmelmann

Cornell Law Faculty Publications

Search engines are the new linchpins of the Internet, and a new body of law - search engine law - will increasingly determine the shape of the Internet. Making sensible search policy requires a clear understanding of how search works, what interests are at stake, and what legal questions intersect at search. This article offers the first comprehensive overview of search engine law, which it organizes into a systematic taxonomy. It then demonstrates the dense legal interrelationships created by search by discussing a series of important themes in search engine law, each of which cuts across many doctrinal areas.


Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman Mar 2006

Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman

Cornell Law Faculty Publications

No abstract provided.


Standard-Form Contracting In The Electronic Age, Robert A. Hillman, Jeffrey J. Rachlinski May 2002

Standard-Form Contracting In The Electronic Age, Robert A. Hillman, Jeffrey J. Rachlinski

Cornell Law Faculty Publications

The development of the Internet as a medium for consumer transactions creates a new question for contract law. In this Article, Professors Robert Hillman and Jeffrey Rachlinski address whether the risks imposed on consumers by Internet boilerplate requires a new lens through which courts should view these types of contracts. Their analysis of boilerplate in paper and Internet contracts examines the social, cognitive, and rational factors that affect consumers' comprehension of boilerplate and compares business strategies in presenting it. The authors conclude that the influence of these factors in Internet transactions is similar to that in proper transactions. Although the …


The Internet: "Full And Unfettered Access" To Law -- Some Implications, Peter W. Martin Jul 1999

The Internet: "Full And Unfettered Access" To Law -- Some Implications, Peter W. Martin

Cornell Law Faculty Publications

No abstract provided.


The Impact Of The Internet On The Development Of Law, Peter W. Martin Dec 1996

The Impact Of The Internet On The Development Of Law, Peter W. Martin

Cornell Law Faculty Publications

No abstract provided.