Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Georgetown University Law Center

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 32

Full-Text Articles in Internet Law

Artificial Intelligence And Trade, Anupam Chander Jan 2021

Artificial Intelligence And Trade, Anupam Chander

Georgetown Law Faculty Publications and Other Works

Artificial Intelligence is already powering trade today. It is crossing borders, learning, making decisions, and operating cyber-physical systems. It underlies many of the services that are offered today – from customer service chatbots to customer relations software to business processes. The chapter considers AI regulation from the perspective of international trade law. It argues that foreign AI should be regulated by governments – indeed that AI must be ‘locally responsible’. The chapter refutes arguments that trade law should not apply to AI and shows how the WTO agreements might apply to AI using two hypothetical cases . The analysis reveals …


Storming Zuckerberg’S Castle, Anupam Chander Jan 2021

Storming Zuckerberg’S Castle, Anupam Chander

Georgetown Law Faculty Publications and Other Works

A company’s server is its castle, Richard Epstein once declared. Because of this, anyone sending an email to that server needs permission to enter. Within its own logic, this seems incontrovertible, but it depends on a few logical steps worth unpacking. It begins with the premise that a man’s home is his castle. (The masculine pronoun in the early formulation seems relevant.) Let us accept that premise for the purpose of argument. Combining this premise with the investiture of legal personhood on a corporation, we might then deduce that a company’s home must be its castle. Finally, combining that …


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz Apr 2020

The International Intellectual Property Commercialization Council’S 3rd Annual U.S. Conference: The State Of Innovation In The Union, Neel U. Sukhatme, Paul R. Zielinski, G. Nagesh Rao, Pj Bellomo, Matthew Byers, Meghan Gaffney Buck, Everardo Ruiz

Georgetown Law Faculty Publications and Other Works

The International Intellectual Property Commercialization Council (“IIPCC”) presented its third annual policy conference at the United States Capitol on May 6, 2019. The conference’s theme explored the question of “what is the state of innovation in the United States?” Panelists included The Honorable Andrei Iancu – Under Secretary of Commerce for Intellectual Property and Director of the United States Patent and Trademark Office; Dr. Carl J. Schramm – University Professor, Syracuse University and Former President of the Ewing Marion Kauffman Foundation; Mr. Patrick Kilbride – Senior Vice President of the Global Innovation Policy Center (“GIPC”) at the U.S. Chamber of …


New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue Mar 2020

New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

New media facilitates communication and creates a common, lived experience. It also carries the potential for great harm on an individual and societal scale. Posting integrates information and emotion, with study after study finding that fear and anger transfer most readily online. Isolation follows, with insular groups forming. The result is an increasing bifurcation of society. Scholars also write about rising levels of depression and suicide that stem from online dependence and replacing analogical experience with digital interaction, as well as escalating levels of anxiety that are rooted in the validation expectation of the ‘like’ function. These changes generate instability …


Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll Jan 2020

Platforms And The Fall Of The Fourth Estate: Looking Beyond The First Amendment To Protect Watchdog Journalism, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

Journalists see the First Amendment as an amulet, and with good reason. It has long protected the Fourth Estate—an independent institutional press—in its exercise of editorial discretion to check government power. This protection helped the Fourth Estate flourish in the second half of the twentieth century and ably perform its constitutional watchdog role.

But in the last two decades, the media ecology has changed. The Fourth Estate has been subsumed by a Networked Press in which journalists are joined by engineers, algorithms, audience, and other human and non-human actors in creating and distributing news. The Networked Press’s most powerful members …


Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder Aug 2019

Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder

Georgetown Law Faculty Publications and Other Works

The quarter century since Barlow’s writing allows us to assess his prophecy. The economy moved in the very direction that Barlow anticipated—from an economy focused on the ownership of things to an economy based on services and experiences. In high-income countries, services now account for three-quarters of the gross domestic product.

But intellectual property proved more resilient and adaptable than Barlow predicted. Intellectual property law both offered exceptions where necessary, while simultaneously expanding to cover new forms of creativity and activities. In this short essay, we argue that, for good or ill, intellectual property has reconfigured itself for an economy …


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell Jan 2017

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids app …


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …


After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole Jan 2016

After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole

Georgetown Law Faculty Publications and Other Works

Imagine a state that compels its citizens to inform it at all times of where they are, who they are with, what they are doing, who they are talking to, how they spend their time and money, and even what they are interested in. None of us would want to live there. Human rights groups would condemn the state for denying the most basic elements of human dignity and freedom. Student groups would call for boycotts to show solidarity. We would pity the offending state's citizens for their inability to enjoy the rights and privileges we know to be essential …


The Dawn Of Social Intelligence (Socint), Laura K. Donohue Jan 2015

The Dawn Of Social Intelligence (Socint), Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

More information about citizens’ lives is recorded than ever before. Because the data is digitized, it can be accessed, analyzed, shared, and combined with other information to generate new knowledge. In a post-9/‌11 environment, the legal standards impeding access to such data have fallen. Simultaneously, the advent of global communications and cloud computing, along with network convergence, have expanded the scope of information available. The U.S. government has begun to collect and to analyze the associated data.

The result is the emergence of what can be termed “social intelligence” (SOCINT), which this Article defines as the collection of digital data …


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


Configuring The Networked Citizen, Julie E. Cohen Jan 2012

Configuring The Networked Citizen, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Among legal scholars of technology, it has become commonplace to acknowledge that the design of networked information technologies has regulatory effects. For the most part, that discussion has been structured by the taxonomy developed by Lawrence Lessig, which classifies "code" as one of four principal regulatory modalities, alongside law, markets, and norms. As a result of that framing, questions about the applicability of constitutional protections to technical decisions have taken center stage in legal and policy debates. Some scholars have pondered whether digital architectures unacceptably constrain fundamental liberties, and what "public" design obligations might follow from such a conclusion. Others …


Electronic Communications Privacy Act And The Revolution In Cloud Computing : Hearing Before The Subcomm. On The Constitution, Civil Rights, And Civil Liberties Of The H. Comm. On The Judiciary, 111th Cong., Sept. 23, 2010 (Statement By Adjunct Professor Marc J. Zwillinger, Geo. U. L. Center), Marc J. Zwillinger Sep 2010

Electronic Communications Privacy Act And The Revolution In Cloud Computing : Hearing Before The Subcomm. On The Constitution, Civil Rights, And Civil Liberties Of The H. Comm. On The Judiciary, 111th Cong., Sept. 23, 2010 (Statement By Adjunct Professor Marc J. Zwillinger, Geo. U. L. Center), Marc J. Zwillinger

Testimony Before Congress

ECPA has functioned fairly well during its first 20 years in striking the right balance between law enforcement needs and the privacy expectation of U.S. citizens. But when it was initially passed in 1986, Congress recognized that the “law must advance with the technology to ensure the continued vitality of the fourth amendment.” Based on my experience as an ECPA practitioner for the past 13 years, I believe the time is ripe for another advancement. I hope you will consider these perspectives in crafting legislation that balances law enforcement needs and user privacy in a manner that reflects the reality …


Online Privacy, Social Networking, And Crime Victimization : Hearing Before The H. Subcomm. On Crime, Terrorism, And Homeland Security Of The H. Comm. On The Judiciary, 111th Cong., July 28, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg Jul 2010

Online Privacy, Social Networking, And Crime Victimization : Hearing Before The H. Subcomm. On Crime, Terrorism, And Homeland Security Of The H. Comm. On The Judiciary, 111th Cong., July 28, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg

Testimony Before Congress

Mr. Chairman, Facebook is a tremendous service, with the scope of email, the telephone, and even the Internet itself. It is also the source of many of the privacy concerns of users today. The critical problem is not what users post; it is that the Facebook changes the privacy settings too frequently and Facebook makes it too difficult for users to selectively post information. Self‐regulation has not worked because the FTC has been reluctant to pursue investigations. So, EPIC recommends changes to ECPA in Title 18 that would give users greater control of their information and reduce risk when they …


Planning For The Future Of Cyber Attack Attribution : Hearing Before The H. Subcomm. On Technology And Innovation Of The H. Comm. On Science And Technology, 111th Cong., July 15, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg Jul 2010

Planning For The Future Of Cyber Attack Attribution : Hearing Before The H. Subcomm. On Technology And Innovation Of The H. Comm. On Science And Technology, 111th Cong., July 15, 2010 (Statement By Adjunct Professor Marc Rotenberg, Geo. U. L. Center), Marc Rotenberg

Testimony Before Congress

Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr. Bellovin explains:

The fundamental premise of the proposed strategy is that our serious Internet security problems are due to lack of sufficient authentication. That is demonstrably false. The biggest problem was and is buggy code. All the authentication in the world won't stop a bad guy who goes around the authentication system, either by finding bugs exploitable before authentication is performed, finding bugs in the authentication system itself, or …


Hybrid Vigor: Mashups, Cyborgs, And Other Necessary Monsters, Rebecca Tushnet Jan 2010

Hybrid Vigor: Mashups, Cyborgs, And Other Necessary Monsters, Rebecca Tushnet

Georgetown Law Faculty Publications and Other Works

Does remix matter? This brief comment addresses the critique of importance, arguing that remix culture as well as the popular/mass culture from which it springs are of vital importance to human flourishing, invoking Donna Haraway's concept of the cyborg to investigate the fluidity, dynamism, and monstrousness of remixes and remixers.


Questioning Cultural Commons, Lawrence B. Solum Jan 2010

Questioning Cultural Commons, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

In Constructing Commons in the Cultural Environment, Michael J. Madison, Brett M. Frischmann, and Katherine J. Strandburg offer an innovative and attractive vision of the future of cultural and scientific knowledge through the construction of “cultural commons,” which they define as “environments for developing and distributing cultural and scientific knowledge through institutions that support pooling and sharing that knowledge in a managed way.” The kind of “commons” they have in mind is modeled on the complex arrangement of social norms that allocate lobstering rights among fishermen in Maine and extends to arrangements such as patent pools, open-source software development …


Passport Files: Privacy Protection Needed For All Americans: Hearing Before The S. Comm. On The Judiciary, 110th Cong., July 10, 2008 (Statement Of Marc Rotenberg, Adjunct Prof. Of Law, Geo. U. L. Center), Marc Rotenberg Jun 2008

Passport Files: Privacy Protection Needed For All Americans: Hearing Before The S. Comm. On The Judiciary, 110th Cong., July 10, 2008 (Statement Of Marc Rotenberg, Adjunct Prof. Of Law, Geo. U. L. Center), Marc Rotenberg

Testimony Before Congress

No abstract provided.


Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen Jan 2008

Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of visibility has created two problems. First, focusing on visibility diminishes the salience and obscures the operation of nonvisual mechanisms designed to render individual identity, behavior, and preferences transparent to third parties. The metaphoric mapping to visibility suggests that surveillance is simply passive observation, rather than the active production of categories, narratives, and, norms. Second, even a broader conception of privacy harms as a function …


Network Stories, Julie E. Cohen Jan 2007

Network Stories, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In 1962, Rachel Carson named the natural environment. Scientists were beginning to understand the complex web of ecological cause and effect; naming that web gave it independent existence and invested that existence with political meaning. In 1996, James Boyle named the cultural environment. Boyle’s act of naming was intended to jumpstart a political movement by appropriating the complex web of political meaning centered on the interdependency of environmental resources.

But naming, although important, is only a beginning. The example of the natural environment shows us that to build from a name to a movement requires two things. First, you have …


Cyberspace As/And Space, Julie E. Cohen Jan 2007

Cyberspace As/And Space, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …


Pervasively Distributed Copyright Enforcement, Julie E. Cohen Jan 2006

Pervasively Distributed Copyright Enforcement, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …


The Future Of Copyright, Lawrence B. Solum Jan 2005

The Future Of Copyright, Lawrence B. Solum

Georgetown Law Faculty Publications and Other Works

Review of Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity by Lawrence Lessig (2004).

Sometimes technological change is so profound that it rocks the foundations of an entire body of law. Peer-to-peer (P2P) filesharing systems--Napster, Gnutella, KaZaA, Grokster, and Freenet3--are mere symptoms of a set of technological innovations that have set in motion an ongoing process of fundamental changes in the nature of copyright law. The video tape recorder begat the Sony substantial noninfringing use defense. The digital cassette recorder begat the Audio Home Recording Act. The internet begat the Digital …


Uncle Sam Is Watching You, David Cole Nov 2004

Uncle Sam Is Watching You, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Digital Architecture As Crime Control, Neal K. Katyal Jan 2003

Digital Architecture As Crime Control, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House's recent proposals on cybersecurity.

The paper begins by introducing four concepts of …


Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen Jan 2001

Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000).

Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen …


Criminal Law In Cyberspace, Neal K. Katyal Jan 2001

Criminal Law In Cyberspace, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

Two of the most talked-about crimes of the year, the ILoveYou computer worm and the denial of service attacks on Yahoo, eBay, and ETrade, suggest that a new form of crime is emerging: cybercrime. Thousands of these crimes occur each year, and the results are often catastrophic; in terms of economic damage, the ILoveYou worm may have been the most devastating crime in history, causing more than $11 billion in losses.

This paper asks how cybercrime is best deterred. It identifies five constraints on crime - legal sanctions, monetary perpetration cost, social norms, architecture, and physical risks - and explains …


Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen Jan 2000

Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests. On a theoretical level, data processors and other data privacy opponents argue that imposing restrictions on the collection, use, and exchange of personal data would ignore established understandings of property, limit individual freedom of choice, violate principles of rational information use, and infringe data processors' freedom of speech. In this article, Professor Julie Cohen explores these theoretical challenges to informational privacy protection. She concludes that categorical arguments from property, choice, truth, and speech lack weight, and mask …


Lochner In Cyberspace: The New Economic Orthodoxy Of "Rights Management", Julie E. Cohen Jan 1998

Lochner In Cyberspace: The New Economic Orthodoxy Of "Rights Management", Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

Part I of this Article describes the economic models now proffered as the basis for defining rights in digital works, and explores their striking resemblance to the system of social ordering described and advanced in the Supreme Court's Lochner-era decisions. The ghost of Lochner is not invoked lightly, nor with intent to belittle. Lochner represented a particular ideal of social ordering, premised on a seamless convergence of the private-law institutions of property and contract to provide a zone of legal insulation for market outcomes. In the physical world, that vision has long been compromised by evidence of market failures …