Online Disinhibited Contracts, 2024 Texas A&M University School of Law
Online Disinhibited Contracts, Wayne R. Barnes
Faculty Scholarship
There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …
Robots As Pirates, 2024 Chicago-Kent College of Law
Robots As Pirates, Henry H. Perritt Jr.
Catholic University Law Review
Generative AI has created much excitement over its potential to create new works of authorship in the literary and graphical realms. Its underling machine-learning technology works by analyzing the relations among elements of preexisting material in enormous databases assembled from publicly available and licensed sources. Its algorithms “learn” to predict “what comes next” in different types of expression. A complete system thus can become glib in creating new factual summaries, essays, fictional stories and images.
A number of authors of the raw material used by Generative AI engines claim that the machine learning process infringes their copyrights. Careful evaluation of …
Digital Terror Crimes, 2024 West Virginia University College of Law
Digital Terror Crimes, Cody Corliss
Law Faculty Scholarship
Terror actors operating within armed conflict have weaponized social media by using these platforms to threaten and spread images of brutality in order to taunt, terrify, and intimidate civilians. These acts or threats of violence are terror, a prohibited war crime in which acts or threats of violence are made with the primary purpose of spreading terror among the civilian population. The weaponization of terror content through social media is a digital terror crime.
This article is the first to argue that the war crime of terror applies to digital terror crimes perpetrated through social media platforms. It situates digital …
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, 2024 Northwestern Pritzker School of Law
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, 2024 University of Miami School of Law
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Piercing The Shield Of U.C.C. Article 4a: Estate Of Levin V. Wells Fargo Bank’S, Implications For Terrorism Victims’ Attachment Of Blocked Electronic Wire Transfers Originating From State Sponsors Of Terrorism, 2024 Columbia Law School
Piercing The Shield Of U.C.C. Article 4a: Estate Of Levin V. Wells Fargo Bank’S, Implications For Terrorism Victims’ Attachment Of Blocked Electronic Wire Transfers Originating From State Sponsors Of Terrorism, Olivia Lu
University of Miami Business Law Review
This Piece examines how ambiguity in the property interests that would be subject to attachment under section 201 of the Terrorism Risk Insurance Act (“TRIA”) and section 1610(g) of the Foreign Sovereign Immunities Act (“FSIA”) has affected efforts by victims of terrorism to fulfill their monetary judgments, especially in light of courts’ use of Article 4A of the Uniform Commercial Code to fill the definitional gap. This Piece focuses on a recent D.C. Circuit decision, Estate of Levin v. Wells Fargo Bank, N.A., analyzing its implications for terrorism victims holding monetary judgments to attach blocked electronic funds transfers (“EFTs”) originating …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, 2024 University of Miami School of Law
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Privacy’S Next Act, 2024 University of Washington School of Law
Privacy’S Next Act, Erik Lampmann-Shaver
Washington Journal of Law, Technology & Arts
This Article identifies and describes three data privacy policy developments from recent legislative sessions that may seem unrelated, but which I contend together offer clues about privacy law’s future over the short-to-medium term.
The first is the proliferation, worldwide and in U.S. states, of legislative proposals and statutes referred to as “age-appropriate design codes.” Originating in the United Kingdom, age-appropriate design codes typically apply to online services “directed to children” and subject such services to transparency, default settings, and other requirements. Chief among them is an implied obligation to conduct ongoing assessments of whether a service could be deemed “directed …
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, 2024 University of Washington School of Law
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Washington Journal of Law, Technology & Arts
If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.
In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …
Limits Of Algorithmic Fair Use, 2024 University of Washington School of Law
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Washington Journal of Law, Technology & Arts
In this article, we apply historical copyright principles to the evolving state of text-to-image generation and explore the implications of emerging technological constructs for copyright’s fair use doctrine. Artificial intelligence (“AI”) is frequently trained on copyrighted works, which usually involves extensive copying without owners’ authorization. Such copying could constitute prima facie copyright infringement, but existing guidance suggests fair use should apply to most machine learning contexts. Mark Lemley and Bryan Casey argue that training machine learning (“ML”) models on copyrighted material should generally be permitted under fair use when the model’s outputs transcends the purpose of its inputs. Their arguments …
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, 2024 University of Washington School of Law
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Washington Journal of Law, Technology & Arts
This article investigates the longevity of health QR codes, a digital instrument of pandemic surveillance, in post-COVID China. From 2020 to 2022, China widely used this tri-color tool to combat the COVID-19 pandemic. A commonly held assumption is that health QR codes have become obsolete in post-pandemic China. This study challenges such an assumption. It reveals their persistence and integration - through mobile apps and online platforms - beyond the COVID-19 public health emergency. A prolonged, expanded and normalized use of tools which were originally intended for contact tracing and pandemic surveillance raises critical legal and ethical concerns. Moreover, their …
Shareholder Primacy Versus Shareholder Accountability, 2024 Seattle University School of Law
Shareholder Primacy Versus Shareholder Accountability, William W. Bratton
Seattle University Law Review
When corporations inflict injuries in the course of business, shareholders wielding environmental, social, and governance (“ESG”) principles can, and now sometimes do, intervene to correct the matter. In the emerging fact pattern, corporate social accountability expands out of its historic collectivized frame to become an internal subject matter—a corporate governance topic. As a result, shareholder accountability surfaces as a policy question for the first time. The Big Three index fund managers, BlackRock, Vanguard, and State Street, responded to the accountability question with ESG activism. In so doing, they defected against corporate legal theory’s central tenet, shareholder primacy. Shareholder primacy builds …
Public Primacy In Corporate Law, 2024 Seattle University School of Law
Public Primacy In Corporate Law, Dorothy S. Lund
Seattle University Law Review
This Article explores the malleability of agency theory by showing that it could be used to justify a “public primacy” standard for corporate law that would direct fiduciaries to promote the value of the corporation for the benefit of the public. Employing agency theory to describe the relationship between corporate management and the broader public sheds light on aspects of firm behavior, as well as the nature of state contracting with corporations. It also provides a lodestar for a possible future evolution of corporate law and governance: minimize the agency costs created by the divergence of interests between management and …
Corporate Law In The Global South: Heterodox Stakeholderism, 2024 Seattle University School of Law
Corporate Law In The Global South: Heterodox Stakeholderism, Mariana Pargendler
Seattle University Law Review
How do the corporate laws of Global South jurisdictions differ from their Global North counterparts? Prevailing stereotypes depict the corporate laws of developing countries as either antiquated or plagued by problems of enforcement and misfit despite formal convergence. This Article offers a different view by showing how Global South jurisdictions have pioneered heterodox stakeholder approaches in corporate law, such as the erosion of limited liability for purposes of stakeholder protection in Brazil and India, the adoption of mandatory corporate social responsibility in Indonesia and India, and the large-scale program of Black corporate ownership and empowerment in South Africa, among many …
Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, 2024 Seattle University School of Law
Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu
Seattle University Law Review
Robo-voting is the practice by an investment fund of mechanically voting in corporate elections according to the advice of its proxy advisor— in effect fully delegating its voting decision to its advisor. We examined over 65 million votes cast during the period 2008–2021 by 14,582 mutual funds to describe and quantify the prevalence of robo-voting. Overall, 33% of mutual funds robo-voted in 2021: 22% with ISS, 4% with Glass Lewis, and six percent with the recommendations of the issuer’s management. The fraction of funds that robo-voted increased until around 2013 and then stabilized at the current level. Despite the sizable …
The Esg Information System, 2024 Seattle University School of Law
The Esg Information System, Stavros Gadinis, Amelia Miazad
Seattle University Law Review
The mounting focus on ESG has forced internal corporate decision-making into the spotlight. Investors are eager to support companies in innovative “green” technologies and scrutinize companies’ transition plans. Activists are targeting boards whose decisions appear too timid or insufficiently explained. Consumers and employees are incorporating companies sustainability credentials in their purchasing and employment decisions. These actors are asking companies for better information, higher quality reports, and granular data. In response, companies are producing lengthy sustainability reports, adopting ambitious purpose statements, and touting their sustainability credentials. Understandably, concerns about greenwashing and accountability abound, and policymakers are preparing for action.
In this …
Stakeholder Governance On The Ground (And In The Sky), 2024 Seattle University School of Law
Stakeholder Governance On The Ground (And In The Sky), Stephen Johnson, Frank Partnoy
Seattle University Law Review
Professor Frank Partnoy: This is a marvelous gathering, and it is all due to Chuck O’Kelley and the special gentleness, openness, and creativity that he brings to this symposium. For more than a decade, he has been open to new and creative ways to discuss important issues surrounding business law and Adolf Berle’s legacy. We also are grateful to Dorothy Lund for co-organizing this gathering.
In introducing Stephen Johnson, I am reminded of a previous Berle, where Chuck allowed me some time to present the initial thoughts that led to my book, WAIT: The Art and Science of Delay. Part …
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, 2024 Notre Dame Law School
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Journal of Legislation
No abstract provided.
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, 2024 Seattle University School of Law
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Seattle University Law Review
The Berle XIV: Developing a 21st Century Corporate Governance Model Conference asks whether there is a viable 21st Century Stakeholder Governance model. In our conference keynote article, we argue that to answer that question yes requires restoring—to use Berle’s term—a “public consensus” throughout the global economy in favor of the balanced model of New Deal capitalism, within which corporations could operate in a way good for all their stakeholders and society, that Berle himself supported.
The world now faces problems caused in large part by the enormous international power of corporations and the institutional investors who dominate their governance. These …
Delegated Corporate Voting And The Deliberative Franchise, 2024 Seattle University School of Law
Delegated Corporate Voting And The Deliberative Franchise, Sarah C. Haan
Seattle University Law Review
Starting in the 1930s with the earliest version of the proxy rules, the Securities and Exchange Commission (SEC) has gradually increased the proportion of “instructed” votes on the shareholder’s proxy card until, for the first time in 2022, it required a fully instructed proxy card. This evolution effectively shifted the exercise of the shareholder’s vote from the shareholders’ meeting to the vote delegation that occurs when the share-holder fills out the proxy card. The point in the electoral process when the binding voting choice is communicated is now the execution of the proxy card (assuming the shareholder completes the card …