Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Computational Complexity And Tort Deterrence, Joshua C. Teitelbaum May 2021

Computational Complexity And Tort Deterrence, Joshua C. Teitelbaum

Georgetown Law Faculty Publications and Other Works

Standard formulations of the economic model of tort deterrence constitute the injurer as the unboundedly rational bad man. Unbounded rationality implies that the injurer can always compute the solution to his care-taking problem. This in turn implies that optimal liability rules can provide robust deterrence, for they can always induce the injurer to take socially optimal care. In this paper I examine the computational complexity of the injurer's care-taking problem. I show that the injurer's problem is computationally tractable when the precaution set is unidimensional or convex, but that it is computationally intractable when the precaution set is multidimensional and …


Sovereignty 2.0, Anupam Chander, Haochen Sun Jan 2021

Sovereignty 2.0, Anupam Chander, Haochen Sun

Georgetown Law Faculty Publications and Other Works

Digital sovereignty—the exercise of control over the internet—is the ambition of the world’s leaders, from Australia to Zimbabwe, a bulwark against both foreign state and foreign corporation. Governments have resoundingly answered first-generation internet law questions of who if anyone should regulate the internet—they all will. We now confront second generation questions—not whether, but how to regulate the internet. We argue that digital sovereignty is simultaneously a necessary incident of democratic governance and democracy’s dreaded antagonist. As international law scholar Louis Henkin taught us, sovereignty can insulate a government’s worst ills from foreign intrusion. Assertions of digital sovereignty, in particular, …


Artificial Intelligence And Trade, Anupam Chander Jan 2021

Artificial Intelligence And Trade, Anupam Chander

Georgetown Law Faculty Publications and Other Works

Artificial Intelligence is already powering trade today. It is crossing borders, learning, making decisions, and operating cyber-physical systems. It underlies many of the services that are offered today – from customer service chatbots to customer relations software to business processes. The chapter considers AI regulation from the perspective of international trade law. It argues that foreign AI should be regulated by governments – indeed that AI must be ‘locally responsible’. The chapter refutes arguments that trade law should not apply to AI and shows how the WTO agreements might apply to AI using two hypothetical cases . The analysis reveals …


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander Jan 2013

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


Electronic Communications Privacy Act And The Revolution In Cloud Computing : Hearing Before The Subcomm. On The Constitution, Civil Rights, And Civil Liberties Of The H. Comm. On The Judiciary, 111th Cong., Sept. 23, 2010 (Statement By Adjunct Professor Marc J. Zwillinger, Geo. U. L. Center), Marc J. Zwillinger Sep 2010

Electronic Communications Privacy Act And The Revolution In Cloud Computing : Hearing Before The Subcomm. On The Constitution, Civil Rights, And Civil Liberties Of The H. Comm. On The Judiciary, 111th Cong., Sept. 23, 2010 (Statement By Adjunct Professor Marc J. Zwillinger, Geo. U. L. Center), Marc J. Zwillinger

Testimony Before Congress

ECPA has functioned fairly well during its first 20 years in striking the right balance between law enforcement needs and the privacy expectation of U.S. citizens. But when it was initially passed in 1986, Congress recognized that the “law must advance with the technology to ensure the continued vitality of the fourth amendment.” Based on my experience as an ECPA practitioner for the past 13 years, I believe the time is ripe for another advancement. I hope you will consider these perspectives in crafting legislation that balances law enforcement needs and user privacy in a manner that reflects the reality …


Digital Architecture As Crime Control, Neal K. Katyal Jan 2003

Digital Architecture As Crime Control, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House's recent proposals on cybersecurity.

The paper begins by introducing four concepts of …