Open Access. Powered by Scholars. Published by Universities.®

Legislation Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Legislation

Faculty Colloquia, Spring 2010 Series, Royce Barondes, Kimberle Crenshaw, Chris Elmendorf, Michael Kang, Oliver Moreteau, Deborah Pearlstein, Richard Peltz, Nirej Sekhon, Stephanie Stern, Lee-Ford Tritt, Michael Zimmer Oct 2013

Faculty Colloquia, Spring 2010 Series, Royce Barondes, Kimberle Crenshaw, Chris Elmendorf, Michael Kang, Oliver Moreteau, Deborah Pearlstein, Richard Peltz, Nirej Sekhon, Stephanie Stern, Lee-Ford Tritt, Michael Zimmer

Lee-ford Tritt

Spring 2010 Presenters January 25: Royce Barondes (University of Missouri School of Law), ABA Ratings of Federal District Court Judges and the Likelihood of a Shepard’s Warning Signal February 1: Stephanie Stern (Loyola University Chicago School of Law), The Inviolable Home: From Iconic Property to Relational Privacy in the Fourth Amendment February 8: Michael Kang (Emory University School of Law), Sore Loser Laws February 15: Oliver Moreteau (LSU Paul M. Hebert Law Center), The Future of Civil Codes in Europe February 22: Deborah Pearlstein (Princeton University Woodrow Wilson School for Public and International Affairs), After Deference: Formal Approaches to Interpretation …


Restoring The Right To Organize In The Private Sector, James Newell Jul 2013

Restoring The Right To Organize In The Private Sector, James Newell

James Newell

No abstract provided.


The Implausibility Of Secrecy, Mark Fenster Feb 2013

The Implausibility Of Secrecy, Mark Fenster

Mark Fenster

Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events—among them the WikiLeaks episode, the Obama administration’s celebrated leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters—undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, open sources—each of these constitutes a path out …